logo

PA-DSS


Summary

The PCI Payment Application Data Security Standard (PA-DSS) Requirements and Security Assessment Procedures define security requirements and assessment procedures for software vendors of payment applications. The version used in this section is PA-DSS version 3.0, November 2013.


Definitions

DefinitionRequirements
PADSS-1_1. Do not store sensitive authentication data after authorization
PADSS-1_1_1. Do not store full contents of any track from the magnetic stripe
PADSS-1_1_2. Do not store the card verification value or code used to verify transactions
PADSS-1_1_3. Do not store personal identification number (PIN) or the encrypted PIN block
PADSS-1_1_4. Securely delete any track data, card verification values or codes, and PINs or PIN block data stored by application in accordance with industry-accepted standards
PADSS-1_1_5. Do not store sensitive authentication data on vendor systems
PADSS-2_1. Provide guidance to customers regarding secure deletion of cardholder data
PADSS-2_2. Mask PAN when displayed
PADSS-2_3. Render PAN unreadable anywhere it is stored
PADSS-2_5. Implement key management processes and procedures for cryptographic keys used for encryption of cardholder data
PADSS-2_5_1. Generation of strong cryptographic keys
PADSS-2_5_2. Secure cryptographic key distribution
PADSS-2_5_3. Secure cryptographic key storage
PADSS-2_5_4. Cryptographic key changes for keys
PADSS-2_5_5. Retirement or replacement of keys
PADSS-2_5_7. Prevention of unauthorized substitution of cryptographic keys
PADSS-3_1. Support and enforce the use of unique user IDs and secure authentication for all administrative access
PADSS-3_1_2. Enforce the changing of all default application passwords for all accounts
PADSS-3_1_4. Application employs methods to authenticate all users
PADSS-3_1_5. Payment application does not require or use any group, shared, or generic accounts and passwords
PADSS-3_1_6. Passwords must meet minimum requirements
PADSS-3_1_7. Payment application requires changes to user passwords at least every 90 days
PADSS-3_1_11. Require the user to re-authenticate to re-activate the session (inactive)
PADSS-3_3_1. Use strong cryptography to render all payment application passwords unreadable during transmission
PADSS-3_4. Limit access to required functions/resources and enforce least privilege for built-in accounts
PADSS-4_1. Log all user access and be able to link all activities to individual users
PADSS-4_2_2. Actions taken by any individual with root or administrative privileges
PADSS-4_2_4. Invalid logical access attempts
PADSS-4_2_5. Changes to the application's identification and authentication mechanisms with root or administrative privileges
PADSS-4_2_6. Initialization, stopping, or pausing of the application audit logs
PADSS-4_2_7. Creation and deletion of system-level objects
PADSS-4_3. Payment application's audit log settings and audit log output
PADSS-4_4. Facilitate centralized logging
PADSS-5_1_1. Live PANs are not used for testing or development
PADSS-5_1_2. Test data and accounts are removed before release to customer
PADSS-5_1_5. Secure practices are implemented to verify integrity of source code during the development process
PADSS-5_2_1. Injection flaws, particularly SQL injection
PADSS-5_2_2. Buffer Overflow
PADSS-5_2_3. Insecure cryptographic storage
PADSS-5_2_4. Insecure communications
PADSS-5_2_5. Improper error handling
PADSS-5_2_7. Cross-site scripting (XSS)
PADSS-5_2_8. Improper access controls
PADSS-5_2_9. Cross-site request forgery (CSRF)
PADSS-5_2_10. Broken authentication and session management
PADSS-5_4_6. Process in place to review application updates
PADSS-6_1. The wireless technology must be implemented securely
PADSS-6_2. For wireless technology, implement strong encryption for authentication and transmission
PADSS-8_1. Secure network environment
PADSS-8_2. Use of necessary and secure services, including those provided by third parties
PADSS-8_3. Operation of two-factor authentication technologies for secure remote access
PADSS-9_1. Any web server and any cardholder data storage component are not required to be on the same server
PADSS-10_2_2. Unique authentication credential must be used for each customer environment
PADSS-10_2_3. Remote access to customer's payment applications must be implemented securely
PADSS-11_1. Use of strong cryptography and security protocols to safeguard sensitive cardholder data during transmission
PADSS-11_2. Render the PAN unreadable
PADSS-12_1. Encrypt all nonconsole administrative access with strong cryptography

Last updated

2023/09/18