Visa Pin Security Program Auditors Guide
Visa Pin Security Program Auditors Guide
Visa Pin Security Program Auditors Guide
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
3 4 4 6 7 8 8 12 14 17 20 22 22 25 27 29 29 32 34 37 38 38 41 44 46 49 50 50 52 54 57 60 60 63 66 67
i
Question 25-Limit Key Access Question 26-Log Key Access Question 27-Backup Keys Question 28-Key Administration Procedures Control Objective 7 Equipment Management Question 29-Equipment Inspection Question 30-Equipment Decommissioning Procedures Question 31-TRSM Procedures Appendix APIN Security Audit Checklist Appendix BPIN Security Field Review Agenda
69 74 75 76 78 78 81 82 88 94
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
ii
Forward
The security of Personal Identification Numbers (PINs) assigned to Visa-branded products such as Visa, Electron, Plus, and Interlink has always been of great importance to Visa and its Members. Technical staff from Visa and many Member banks have helped to formulate the standards under which PINs and cryptographic keys are managed and processed by the entities that make up the worldwide payment system. However, Visa's efforts have extended well beyond the development of standards and regulations. Since the mid-1990s, Visa has had a comprehensive PIN Security Compliance program in place. The program includes publication of documents such as the PIN Security Requirements, a compliance-reporting requirement for entities involved in the acceptance or processing of interchange PINs, and the conducting of on-site Field Reviews to verify compliance. This document is designed to explain to internal and external auditors and information security specialists what Visa means by compliance in each area and to help them understand how a Visa Field Reviewer determines compliance in a particular area. By extension, entities can employ these same techniques to assess the adequacy of their implementation for the protection of keys and PINs. This document includes remote key establishment and distribution applications. Such applications use asymmetric key cryptography techniques to establish/distribute symmetric (TDES) keys to remote devices (e.g., PIN Entry Devices, Encrypting PIN Pads, etc.) or between network nodes. Some remote implementations utilize Certification Authorities (CAs). Requirements in the PCI PIN Security Requirements document that have specific additional requirements that apply to remote key establishment and distribution applications and their associated CAs are 5, 6, 10, 15, 18, 19, 20, 21, 22, 25, 28, and 31. Remote key distribution schemes should be used for initial key loading only (i.e., establishment of the TDES key hierarchy, such as a terminal master key). Standard symmetric key exchange mechanisms should be used for subsequent TMK, PEK or other symmetric key exchanges, except where a device requires a new key initialization due to unforeseen loss of the existing TMK. Using asymmetric techniques for routine key exchange can result in unnecessary exposure to man-in-the-middle attacks and should not be used. Certification Authority (CA) requirements apply to all entities signing public keys, whether in X.509 certificate based schemes or other designs. For purposes of these requirements, a certificate is any digitally signed value containing a public key. While we have attempted to make this document easy to read and use, we wish to reiterate the tremendous importance that Visa places in PIN Security and cryptographic key security. We consider PIN and Key Security to be a matter of collective security, rather than an area for competition, and we encourage everyone involved to share information and knowledge freely and openly.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
Need to see the Certification Authority facility that is used, if applicable, for a remote key distribution scheme. Carry out a physical inventory of all key components and key-loading equipment. Need to see demonstrations of key loading for all cryptographic device types used to process PINs (HSMs, ATMs, POS devices).
These "field trips" can be scheduled so as to minimize disruption to your operations. We will also need to interview staff involved with receiving and installing ATMs (and EPPs) and POS devices, and staff knowledgeable about network operations. Detailed conversations with cryptographic key custodians should reveal all of the details relevant to the receipt, dispatch and storage of cryptographic keys, and how keys are actually loaded (e.g., for HSMs, ATMs, POS devices). At various points during the review, we will need to look at all available written documentation, including policies, procedures, audit trails and logs.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
Every one of these weaknesses that is corrected reduces the size of the window of opportunity for an attacker. Correct all of them and a rational attacker will likely decide that the potential reward is far too small for the effort and risk involved.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
ApplicabilityQuestion Scope This question applies to equipment, specifically to all PIN entry devices and Host/Hardware Security Modules (HSMs). See www.visa.com/pin and www.pcisecuritystandards.org/pin. In addition, this question applies to the Hardware Security Modules used with CAs associated with remote key establishment and distribution schemes. Intent of Question To ensure PINs and keys are processed only in equipment (ATMs, POS devices, cash dispenser, and other PIN entry devicesPEDs, and Host Security ModulesHSMs) that meet the requirements for physical security as defined in ISO 9564 and ISO 13491. Note: The characteristics of the actual device can vary, depending on the cryptographic scheme being employed. If a unique master key/unique session key hierarchy is being used, the PIN entry device must qualify as a Tamper-Resistant Security Module (TSRM) using compromise prevention techniques. If a unique fixed key hierarchy is being used, the PIN entry device must also qualify as a TRSM using compromise prevention techniques. If the device does not retain any key that has been used to encrypt or decrypt secret data, including other keys (e.g., Derived Unique Key per Transaction DUKPT), the PIN entry device may use compromise detection techniques. TRSMs relying on compromise detection must use DUKPT. Ultimately, to prevent disclosure of PINs and keys. The processing of PINs outside a TRSM represents a serious violation because it exposes cryptographic keys and the PINs that they protect in unprotected computer memory.
Audit Technique Identify all PIN entry devices (ATMs, EPPs, and POS) and Host Security Modules and compile a list of all such equipment that accepts PINs and processes PINs (e.g., translates PINs from encryption under one key to encryption under another key). Also identify any HSMs used by CAs and compile a list of all such equipment that accepts and/or processes cryptographic keys used in the remote key scheme. For HSMs, obtain and examine one or more of the following: a. NIST certification that the equipment used for PIN translation (hardware or host security modules) complies with a minimum of level 3 of FIPS 140-2-Security Requirements for Cryptographic Modules. This may be obtained from the NIST website (csrc.nist.gov). Hardware Security Modules must be compliant with FIPS 140-2 Level 3 or Level 4 (formal certification is not required, however, such certification is evidence of a device's compliance to this requirement). b. Vendor Certification letters or technical documentation to indicate that the equipment has been designed to meet (ANSI X9.24 and ANSI X9.8/ISO 9564 are the minimum criteria): FIPS 1402Security requirements for Cryptographic Modules-Level 3 or 4. ANSI X9.24Financial Services Retail Key Management. ANSI X9.8Personal Identification Number Management and Security (all parts). ISO 9564Banking-Personal Identification Number Management and Security (all parts). ISO 134911Banking-Secure Cryptographic Devices (Retail), Part 1 Concepts, Requirements and Evaluation methods.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 9
Note: Vendor documentation previously reviewed may be referenced where the documentation exists in workpapers pertaining to another specific review (this review and the workpaper references must be cited) using the same make and model of equipment. For attended POS PIN acceptance devices and for EPPs for ATMs and unattended POS PIN acceptance devices, refer to www.visa.com/pin and www.pcisecuritystandards.org/pin to ensure that devices have been evaluated at a PCI recognized laboratory and that the evaluation has been completed in compliance with the PCI (Visa) PED Security Program. Obtain documented verification of the evaluation. Specifically: a. Ensure the PIN entry device security evaluation has been completed: Effective 1 January 2004, all newly deployed attended POS PIN acceptance device models (including replacement devices) must have passed testing by a PCI-recognized laboratory and be approved by Visa for new deployments. Effective 1 October 2005, all newly deployed EPPs, including replacements or those in newly deployed ATMs, must have passed testing by a PCI-recognized laboratory and be approved by Visa for new deployments. Effective 1 October 2007, all newly deployed unattended POS PIN acceptance devices must contain an EPP that has passed testing by a PCI recognized laboratory and is approved by Visa for new deployments, and if used for offline PIN acceptance, a laboratory validated and Visa approved secure smart card reader. Effective 1 July 2010, all attended POS PIN acceptance device models must have passed testing by a PCI-recognized laboratory and have been approved by Visa. Note: All newly deployed attended POS devices and the EPPs in all newly deployed ATMs and unattended POS PIN acceptance devices must be on the approved list at the time of purchase. They may be deployed subsequent to approval expiration if the approval was not expired at the time of purchase. For additional information, see the separate links for General FAQs and Mandates at www.visa.com/pin. b. Ensure such equipment complies with TDES requirements: Effective 01 January 2003, all newly deployed ATMs (including replacement devices) must support TDES. Effective 01 January 2004, all newly deployed POS PIN acceptance devices (including replacement devices) must support TDES. Effective 1 July 2010, Cardholder PINs must be TDES encrypted from all Points-ofTransaction to the Issuer. However, each Visa Region's TDES dates will supersede the global TDES date whenever the Visa Region date precedes the global date. Note: Must support means the device has all the necessary hardware and software required for TDES installed and only requires the loading of a TDES key. c. Ensure display options used by attended POS PIN acceptance devices are in compliance. These options are specified at www.visa.com/pin and www.pcisecuritystandards.org/pin) as either class A (the device is either totally locked by the PED vendor from alteration of display or the display can only be altered by the PED vendor) or class B (the PED display can be altered by a third party subject to constraints noted below). If the PIN entry keyboard may be used to enter non-PIN data, then:
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 10
All prompts for non-PIN data entry are under the control of the cryptographic unit of the PED and requiring an attack potential of at least 16 per PED for identification and initial exploitation as defined in Appendix B of the PCI POS PED DTRs to circumvent. If the prompts are stored inside the cryptographic unit, they cannot feasibly be altered without causing the erasure of the units cryptographic keys. If the prompts are stored outside the cryptographic unit, cryptographic mechanisms must exist to ensure the authenticity and the proper use of the prompts and that modification of the prompts or improper use of the prompts is prevented (class A), or The unauthorized alteration of prompts for non-PIN data entry into the PIN entry key pad such that PINs are compromised, i.e., by prompting for the PIN entry when the output is not encrypted, cannot occur without requiring an attack potential of at least 16 per PED for identification and initial exploitation as defined in Appendix B of the PCI POS PED DTRs (class A), or For active display devices, cryptographically based controls are utilized to control the PED display and PED usage such that it is infeasible for an entity not possessing the unlocking mechanism to alter the display and to allow the output of unencrypted PIN data from the PED. The controls provide for unique accountability and utilize key sizes appropriate for the algorithm(s) in question. Key-management techniques and other control mechanisms are defined and include appropriate application of the principles of dual control and split knowledge. (class B). d. Examine the device and its characteristics: (A TRSM has a number of features that are designed to protect the secrecy of the cryptographic key(s) contained in its memory. These features may include temperature, pressure and motion sensors, an enclosing wire grid, and an armored case and components. All of these features are designed to detect, resist and react to any attempt by an adversary to learn the value of cryptographic keys. The primary method used by a TRSM to defeat such an attempt is to "dump" or erase the keys whenever unauthorized intrusion is detected.) Ensure indicator lights (if any) signify that the device is powered up and armed. Ensure locks (if any) are turned to the locked position and the keys are removed. Determine if the device has mechanisms that will cause it to dump or erase the keys in the event of intrusion. Determine if the same make and model were previously reviewed and determined to be compliant or non-compliant then. If it is not clear that the device is a TRSM, request an affidavit of compliance from the manufacturer. This affidavit should stipulate that the device satisfies ANSI and ISO requirements for a TRSM, should identify the independent testing lab that supports this claim, and should bear the signature of a corporate officer.A Note: A clause should be in all of the organization's purchase contracts for ATMs, cash dispensers, POS PIN pads, and Hardware Security Modules requiring the manufacturer to stipulate that all PIN-processing equipment supplied under the contract is compliant. Make sure that the Hardware Security Modules physically present in the data center are powered up, connected to the Host computer, armed and in a state to resist attempts at tampering. One large installation was very proud of its investment in state of the art HSMs until it was pointed out that they were not connected to the Host computer.
A
For attended POS PIN Entry Devices (PEDs) purchased after January 1, 2004 and for EPPs for ATMs purchased after 1 October 2005, and for EPPs for unattended POS devices purchased after 1 October 2007, validate that the devices are listed as approved at www.visa.com/pin and www.pcisecuritystandards.org/pin for the specific purpose (e.g., online or offline).
11
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
Audit Technique Interview responsible personnel to determine encryption algorithms utilized in connection with not-on-us acquisitions of PIN blocks. Examine vendor certification letters or technical documentation to indicate that the PIN processing equipment has been designed to meet approval standards and specifically: ANSI X3.106Modes of DEA Operation. ANSI X3.92Data Encryption Algorithm. ANSI X9.24Financial Services Retail Key Management.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 12
ANSI X9.52Triple Data Encryption Algorithm Modes of Operation. Examine system documentation to verify information provided during interviews: For internally developed systems, review system design documentation or source code for type of key (algorithm) and key sizes used to encrypt the PIN blocks. Examine the point in the code where the calls are made to the Hardware Security Module. For application packages, examine parameter files (e.g., the Base24 KEYF file) to determine type of key (algorithm) and key sizes used to encrypt PIN blocks. Examine PIN translation transactions in a trace log and ensure that the from key cryptogram does not equal the to key cryptogram. Note: This is only valid after establishing the keys are encrypted under the same key and variant. The command(s) to the HSM must be verified (command exists and instructs the HSM to perform PIN translation). Examine the HSM manual to ensure that the PIN translation command utilizes DES/TDES. As noted in the question's scope above, examine the algorithm type parameter (to ensure it denotes DES specifically TDES) and hardware-encryption-required parameter (to ensure it indicates hardware encryptionnot software encryption) on every terminal link, network link, and if applicable, internal path (i.e., if using an Intermediate Key) for the host application. As noted in the question's scope above, examine the encrypted values of the keys to determine the length (32 hexadecimal characters for TDES) on every terminal link, network link, and if applicable, internal path. Examine encrypted PIN blocks to validate they are 8 bytes (16 hexadecimal characters) long and that the individual position values are in the range 0-9, A-F. Note: TDES encrypted PINs will be 16 hexadecimal characters in length with values in the range of 0-9, A-F. Plaintext TDES keys, and cryptograms of TDES keys will be 32 or 48 hexadecimal characters in length, depending on whether double or triple length.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
13
No encipherment is required.
ApplicabilityQuestion Scope This applies to all interchange PINs entered at PIN acceptance devices that process the PINs offline using IC Card technology. Intent of Question When performing offline PIN verification using IC Cards, to ensure the secure transfer of a PIN from entry point to the ICC regardless of whether using an integrated reader and PIN pad or not. Ultimately to ensure that clear PINs are not exposed across links from point of PIN entry to the point of PIN verification in the ICC.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
14
Audit Technique Interview the responsible personnel to determine types and design of offline IC Card technology devices. When the terminal supports offline PIN verification, ensure that proper devices are in place. Specifically: If the reader (Interfacing DeviceIFD) and PIN pad are integrated, the device is a TRSM, or If separate, the reader (IFD) is a TRSM and the PIN pad is a TRSM. Refer to www.visa.com/pin and www.pcisecuritystandards.org/pin to ensure that devices have been evaluated at a PCI recognized laboratory and that the evaluation has been completed in compliance with the PCI (Visa) PED Security Program as explained in question 1. Obtain documented verification of the evaluation. Examine vendor documentation to determine the flow of the PIN from entry point to ICC PIN validation point. Ensure the PIN is protected as described in Section 11.1.2 of Book 2 of the EMV IC Card Specifications for Payment Systems. Specifically: If the IFD and PIN pad are integrated and the offline PIN is to be transmitted to the card in plaintext format, then the PIN pad does not encipher the offline PIN when the plaintext PIN is sent directly from the PIN pad to the IFD. If the IFD and PIN pad are integrated and the offline PIN is to be transmitted to the card in plaintext format, but the offline plaintext PIN is not sent directly from the integrated PIN pad to the IFD, then the PIN pad shall encipher the offline PIN according to ISO 95641 (or an equivalent payment system approved method) for transmission to the IFD. The IFD will then decipher the offline PIN for transmission in plaintext to the card. If the IFD and the PIN pad are not integrated and the offline PIN is to be transmitted to the card in plaintext format, then the PIN pad shall encipher the offline PIN according to ISO 95641 (or an equivalent payment system approved method) for transmission to the IFD. The IFD will then decipher the offline PIN for transmission in plaintext to the card. If the offline PIN is to be transmitted to the card in enciphered format, then the PIN must be enciphered as described in section 7.2. The PIN encipherment process shall take place in either: The tamper evident PIN pad itself. A secure component in the terminal. In this case the PIN pad shall encipher the PIN according to ISO 95641 (or an equivalent payment system approved method) for secure transport of the PIN between the PIN pad and the secure component. If encipherment for offline PIN verification is supported using an asymmetric based encipherment mechanism, review documentation and interview personnel to determine proper management and verification. Check to see that: Keys and certificates are managed in accordance with Section 7 of Book 2 of the EMV IC Card Specifications for Payment Systems.
15
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
PIN encipherment and verification occur as specified in Section 7 of Book 2 of the EMV IC Card Specifications for Payment Systems.
Note: Acquirer keys used for the transport of PINs during an offline PIN verification transaction must be either TDES using at least double length keys, RSA with a key modulus of at least 1024 bits, or an algorithm and key size of equivalent or greater strength approved by Visa.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
16
ISO Format 0
ISO Format 1
ISO Format 3
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
ApplicabilityQuestion Scope This applies to all interchange PINs entered at all ATMs, PIN pads, PIN entry devices, and network processor links connected to the site's host system and for all directions of PIN flow incoming and outgoing. This also applies to any internal PIN translations that may occur within the host system (e.g., if the application uses a Switch Working Key or SWK, or Intermediate Key). Examine PIN block formats on every link into and out of the host system, and on internal paths within the application itself (i.e., if the site operates multiple physical and/or logical instantiations of the application). Examine the PIN block format parameter on every terminal link, network link, and if applicable, internal path (i.e., if using an Intermediate Key) for the host application. Intent of Question To protect against a dictionary attack that can occur if PINs with the same values have encrypted PIN blocks that are the same. The encrypted PIN is not inserted into a message in the clear. It is formatted into a PIN block. PINs can be any lengthfrom 4 to 6 charactersand the field in the message that holds the encrypted PIN is a fixed 16 characters in length. Therefore, the encrypted PIN is combined with other data to completely fill this field. This combination of the PIN and other data is called a PIN Block. Early ATMs, such as the IBM 3624 just filled or "padded" the PIN with hexadecimal Fs. This is called the 3624 or "PIN Pad" PIN block format. The problem with this system is that a given PIN value, such as 1234, will always produce the same encrypted result under a specific key value, which allows an attacker to carry out something called a "dictionary" attack. He doesn't crack the key, but rather just recognizes specific encrypted PIN blocks as the result of entering a particular PIN value. Dictionary attacks are prevented by using ISO PIN Block Format 0 (also known as ANSI PIN Block Format 0), which XORs (exclusive ORs) the rightmost 12 digits of the account number (less the check digit) with the PIN, then encrypts the resulting string using TDES in Electronic Code Book (ECB) mode. ISO PIN Block Format 3 does the same. Even if two cardholders enter the same PIN value, the resulting PIN blocks will be different, since the account numbers are different. As mentioned in question 2, a scheme approved alternative encryption method may be used. Note: The old Visa PIN Block Formats 02, 03, and 04 are not acceptable for interchange traffic. Some superseded Visa publications (incorrectly) allow use of Visa Format 3 PIN blocks. These PIN blocks are identical to the old "PIN Pad" or IBM 3624 format. They are not acceptable and represent a serious security exposure. Visa systems will be modified to reject any incoming messages with insecure PIN blocks in the near future. The Visa Payment Technology Standards Manual (or ISO 95641 or ANSI X9.81) contains details on how to construct the required PIN block. Audit Technique Using the network schematic from the preliminary step, interview responsible personnel to determine the PIN block format(s) utilized for Visa branded product not-on-us traffic from point of acquisition through routing of the transaction to another entity.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 18
Examine vendor certification letters or technical documentation to ensure proper design. The equipment must meet one or more of the following: a. b. ANSI X9.81 - Personal Identification Number Management and Security. ISO 95641 - Banking-Personal Identification Number Management and Security.
Examine system documentation to verify information provided during interviews-this is mandatory, especially if personnel have indicated the use of a compliant PIN block format. For internally developed systems, review system design documentation or source code for type of PIN block format used. Application packages, examine parameter files where the PIN block format is specified (e.g., the KEYF file for Base 24). Verify the format is ANSI or ISO Format 0, ISO format 1 or ISO format 3 as the online PIN block type for compliance. An entry of PIN Pad, 3624, Diebold or anything else is out of compliance.
Examine PIN translation transactions in a trace log and ensure that the from PIN block and the to PIN block are using either ISO format 0, 1 or 3. The command(s) to the HSM must be verified (command exists and instructs the HSM to perform PIN translation).
As noted in the question's scope on page 15, examine PIN block formats on every link into and out of the host system, and on internal paths within the application itself (i.e., if the site operates multiple physical and/or logical instances of the application). Examine the PIN block format parameter on every terminal link, network link, and if applicable, internal path (i.e., if using an Intermediate Key) for the host application.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
19
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
20
Audit Technique Interview appropriate personnel to determine if PINs are stored or retained for some period of time as part of a Store and Forward environment. Where PINs are stored, determine the encryption key used. Verify that when fixed key or master/session is used for PIN encipherment, that a different encryption key is used and that the translation from the PEK to this other working key is performed within a TRSM using the DES algorithm. Note: The store and forward is sometimes used in a supermarket or hypermarket environment. Examine transaction journals/logs to determine the presence of PIN blocks. For environments using online transaction monitors such as CICS or IMS-DC, specifically note how management has identified that no PINs are stored in online transaction journals. For entities that drive POS devices, examine documentation (operating procedures) to verify the disposition of PIN blocks when communication links are down., TRICKAND Be alert to transactions passing through store controllers or concentrators. Ask what happens to the transaction if the Issuer or the Acquirer host is unavailable. If the message is held at the store controller, get the details of the key used to protect the PIN during the period when it is being stored, and get the make and model of the HSM attached to the controller. If there is no HSM, note it as a finding the resolution of which requires installation of a HSM. Note: We have never seen this happen in an ATM environment.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
21
ApplicabilityQuestion Scope This question applies to: All cryptographic keys for all ATMs, PIN pads, PIN entry devices and network processor links to the site's host system for all directions of PIN flow incoming and outgoing. Master Keys and hierarchy keys (e.g., Atalla equipment's Super Keys). Any keys used for internal PIN translations that may occur in the system, or keys used internally. Master Keys and hierarchy keys used by a CAs Host Security Module. All Public and Private key pairs used in the remote key establishment and distribution scheme.
22
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
Intent of Question To maximize the range of possible values for any one key thereby increasing the difficulty of guessing or brute-force attacking keys (making key exhaustion more difficult). To eliminate the use of known keys. To avoid the use of default, test, predictable, easily guessed or simple keys (e.g., 0123456789ABCDEF, alternating 0s and 1s, etc.).
The DES algorithm itself is no secret. In fact, anyone can acquire a copy of it. The only protection offered by DES rests in the strength and secrecy of the cryptographic key used to encrypt the data. One of the ways to defeat DES is to mount a "brute force" attack; in other words, to try all possible combinations until the correct key is guessed. One of the most powerful defenses against a successful "brute force" attack is to ensure that all possible keys have an equal chance of occurrence. The only way to guarantee that this happens is to ensure that a truly random process is used to generate keys. The definition of a random process, whether manual or mechanical, is one that can neither be predicted nor reproduced. The outcome from a true random process is neither predictable nor predictably reproducible. The asymmetric keys used in remote key establishment and distribution schemes protect the initial TDES symmetric key. Therefore, the asymmetric keys must also be generated using a truly random process. If a CA is used, the CAs asymmetric keys must be generated using a truly random process to ensure the integrity of the certificates issued. Audit Technique Using the network schematic from the preliminary step, interview responsible personnel to determine the origin of the cryptographic keys used for interchange. Examine the operation's documentation that describes the key generation processes. This should include manual logs for Master File Keys and Key Exchange Keys. Examine cryptogram files (or samples of check values) to validate unique symmetric keys (random/pseudo-random generation). Examine asymmetric keys fingerprints or hash values to validate unique keys. (Examine public keys to verify uniqueness.) Have the technical staff sort on the cryptograms field (or the check digit field or fingerprint field) to make it easier to spot duplicates. Examine vendor certification letters or technical documentation to indicate that the equipment has been designed to meet appropriate standards and specifications. The equipment must meet one or more of the following: FIPS 1402Security requirements for Cryptographic Modules-Level 3 or Level 4. ISO 115681Banking-Key Management (Retail)-Part 1: Introduction to Key Management. ISO 115682Banking-Key Management (Retail)-Part 2: Key Management Techniques for Symmetric Ciphers. ISO 115683Banking-Key Management (Retail)-Part 3: Key Life Cycle for Symmetric Ciphers. ANSI X9.17Financial Institution Key Management (Wholesale).
23
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
Observe a demonstration of the key generation process. Ensure keys are generated by using the key generation function of a Hardware Security Module (HSM) or similar device. Other acceptable ways are a series of coin flips or any similar process where the outcomes can be reduced to binary values (0-1, true-false, on-off, red-white, and so forth). Ensure keys are NOT generated as follows: By staff thinking up values. Statistical analysis has shown that some values occur more often than others, resulting in an uneven distribution of key values. In computer memory. These could be compromised during the process. By a method that gives the same output value every time a specific starting or seed value is used.
Compare key check values against those for known, default, test, predictable, easily guessed or simple keys. Such check values are often printed in vendor manuals. Ask key custodians to examine symmetric key components in order to identify any obviously non-random components., TRICKS, AND STRANGE OBSERVATIONS No matter what your colleagues tell you, "thinking up" a key or key components is not acceptable. Use the HSM to generate keys. This can also weed out "weak" keys. Refer to the vendor documentation for a list of known factory default and test key check values. If you spot one of these values, ensure the key is replaced and ensure they generate a new random key. Also see question #15.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
24
Intent of Question To ensure: The secrecy and integrity of keys during the key generation process, including during the transfer to the target device or medium. No visual or electronic surveillance or monitoring occurs during the key generation and transfer of the key to the target device or medium. Any secure device (such as a Tamper-Resistant Security Module) used for generating keys is free from any electronic tapping devices, that the component values cannot be observed by any unauthorized person, and that only secure printed output such as a PIN mailer is created.
25
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
Key pair uniqueness per device is guaranteed especially when the key pair is generated externally to the device (in which case the key pair is immediately zeroized from the source device after the transfer to the target device).
Audit Technique For keys identified in the network schematic, interview appropriate personnel to determine the processes used for the key generation. For keys generated as components and/or manually loaded, examine the documentation of how the processes should occur. Examine key generation logs to verify that multiple personnel participate in the key generation processes. Witness a structured walk through/demonstration of the key generation processes for all key types (MKs, AWKs, TMKs, Public/Private key pairs etc.). This should be done to verify information provided through verbal discussion and written documentation: Observe if there is any way that an adversary could obtain the values of the key components and/or key pairs. Inspect the devices used in the process for evidence of tampering. Observe whether the devices are "cold started" and powered off after use (except when an HSM is being used to generate key components/key pairs). Observe whether any live network connections exist. Determine whether any compromise of paper outputs can take place, including waste, printer ribbons, and so forth. Determine that if the key pair is generated externally to the device that will use it, that the key pair and all related critical security parameters (e.g., secret seeds) are deleted (zeroized) immediately after the transfer to the device which will use the key pair occurs. Examine the physical area to verify that the key component and/or key generation process can be done in complete seclusion. Verify that any mechanical or electronic devices being used do not have any extra "dangly bits", such as wiretaps, or mysterious wires or cables sprouting from them. If the component value is printed out, ensure that it is either printed inside a blind envelope, such as a PIN mailer, or that no one but the authorized custodian ever has physical access to the output. Verify that multi-use/purpose computing systems are not used for key generation where any cleartext secret or private key or component thereof appears in unprotected memory.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
26
Audit Technique Review existing documentation for completeness. Documentation detailing procedures and personnel (by organizational placement or name) may include references to vendor documentation. Overview of Documented Procedures for All Questions: Questions 7, 11, 16, 28 and 32Procedure Documentation. Documented procedures are in place for all aspects of cryptographic key management. Question 7Key-Generation Procedures. Documented demonstrably in use for all key-generation processing. procedures exist and are
Question 11Key-Transmission Procedures. Documented procedures exist and are demonstrably in use for all key transmission and conveyance processing. Question 16Key-Loading Procedures. Documented procedures exist and are demonstrably in use (including audit trails) for all key-loading activities. Question 28Key Administration Procedures. Documented procedures exist and are demonstrably in use for all key administration operations. Question 32Equipment Security Procedures. Documented procedures exist and are demonstrably in use to ensure the security and integrity of PIN-processing equipment (e.g., PEDs and HSMs) placed into service, initialized, deployed, used, and decommissioned.
27
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
The operations of all PIN-acceptance processes must be governed by comprehensive written procedures that ensure that both Visa's rules and the institution's policies are strictly observed at all times. Ensure written procedures cover key creation, formation, transmittal, storage, loading, and destruction, as well as govern equipment receipt, inspection, storage, deployment, and decommissioning. Examine the policies that stipulate the use of these procedures and assess, through the distribution list, whether the procedures have been placed in the hands of the appropriate staff. Finally, ensure the existence of the set of logs and audit trails that prove that the procedures have been carried out on an ongoing basis.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
28
Public keys must be conveyed in a manner that protects their integrity and authenticity. Specific techniques exist in how keys must be transferred in order to maintain their integrity. An encryption key, typically Key Encryption Keys (KEKs), must be transferred by physically forwarding the separate components of the key using different communication channels or transmitted in ciphertext form. Key components must be transferred in either tamper-evident packaging or within a TRSM. No person shall have access to any cleartext key during the transport process. A person with access to one component of a key, or to the media conveying this component, must not have access to any other component of this key or to any other medium conveying any other component of this key. Components of encryption keys must be transferred using different communication channels, such as different courier services. It is not sufficient to send key components for a specific key on different days using the same communication channel. Public keys must use a mechanism independent of the actual conveyance method that provides the ability to validate the correct key was received. ApplicabilityQuestion Scope This question applies to: All symmetric and to the public key of asymmetric cryptographic keys that are transferred from a location where the key was generated to a location for loading and/or storing of the key. All cryptographic keys for all ATMs, PIN pads, PIN entry devices and network processor links to the site's host system for all directions of PIN flow incoming and outgoing. Master Keys and hierarchy keys. Any keys used for internal PIN translations that may occur in the system, or keys used internally. Master Keys and hierarchy keys used by a CAs Host Security Module (if conveyed).
29
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
All Public and Private key pairs used in the remote key establishment and distribution scheme specifically the public keys. Digital signature of an HSMs authentication public key signed by a device manufacturers key loaded into the HSM for supporting certain key establishment and distribution applications protocols (if applicable), Device manufacturers authentication key loaded into the HSM for supporting certain key establishment and distribution applications protocols (if applicable). For remote key establishment and distribution implementations, the TDES TMK or fixed PEK symmetric keys encrypted under an asymmetric public key of the recipient (usually the PED, but could also be a network node). For remote key establishment and distribution implementations, the respective public keys of the communicating entities (e.g., the remote device and the acquirers host HSM, the two networks host HSMs).
Intent of Question To ensure: Secrecy and integrity of keys when key components are transferred from the location of generation to the location of loading and/or storing. Integrity and authenticity of public keys that are conveyed from one location to another. This is to protect against a man-in-the-middle attack, or substitution of a public key by an adversary.
Secret or private keys: When a secret or private cryptographic key is sent from one place to another, it must be sent in such a way that it remains totally secret. The governing principles of a secret or private key transmitted as two or more components are split knowledge and dual control. This means that no one person has sufficient knowledge to compromise the key and the key cannot be formed without the direct participation of more than one person. To ensure that these principles are observed, a secret or private key must be sent as two or more full-length components to separate designated recipients through separate delivery methods, such as different courier service firms, or it can be sent encrypted. Note: An encrypted secret or private key may be sent without any special precautions. Public keys: When a public cryptographic key is sent from one place to another, some mechanism independent of the actual conveyance method that provides the ability to validate that the correct key was received must be used. Audit Technique Interview appropriate personnel and examine transmittal and receipt logs for key components that are manually conveyed or received. Note: Electronically transmitted keys or components should only be transmitted as cryptograms.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
30
Review procedural documentation for key receipt and transfer of key components. Follow the route taken by each key component that the organization sends. Typically, these consist of Key Exchange Key (KEK) components that the organization creates and sends to a network with which it exchanges message traffic containing PINs and ATM or PIN pad initialization keys, often referred to as the A and B keys. Note that these rules apply to initialization keys also. Verify that each key component is sent in an opaque, tamper-evident package to a specific, named recipient. Ensure that the components are sent through different methods (for example, FedEx for one and UPS for the other). Components sent on chip cards or other non-paper media must follow the same rules. If sending the cryptogram of a key rather than its components, no special precautions need be taken. However, it is still a good practice to give a transmittal notice and receive a notice of receipt. When the organization receives key components, verify that the components are received by staff designated as key custodians and that they are logged before being placed into secure storage. Trace how all keys are sent and received under normal conditions to ensure that the rules have been followed. Review the written documentation and the key logs to crosscheck that everything has been accounted for. Determine how keys, especially ATM initialization keys, are sent in an emergency. (It seems to be common practice to violate every security procedure in the name of customer service, and it is often the case that the key values are dictated over the telephone or faxed to a service technician. This has the possibility of compromising that key and all of the keys and/or PINs that it ever protected.) Validate that when a public cryptographic key is sent from one place to another, some mechanism independent of the actual conveyance method provides the ability to validate that the correct key was received., TRICKS, AND STRANGE OBSERVATIONS A standard courier envelope is tamper-evident, but the original envelope could have been replaced by another. Use pre-numbered tamper-evident envelopes, with the number of the envelope that was used being communicated to the recipient by phone, fax, email, and so forth. The best transmittal methods include notification to the recipient that a component is coming and with it, a receipt to be returned to the sender. Things not to do: Dictate keys over the telephone Fax cleartext keys or components Write key values into startup instructions Tape key values inside ATMs Write key values in procedure manuals
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
31
Key components are the separate parts of a cleartext key that have been created for transport to another endpoint in a symmetrical cryptographic system. Typically, key components exist for KEKs, such as keys used to encrypt Working Keys for transport across some communication channel. Until such keys can be protected by encryption, or by inclusion in a TRSM, the separate parts must be managed under the strict principles of dual control and split knowledge. Dual control involves a process of using two or more separate entities (usually persons), which are operating in concert to protect sensitive functions or information. Both entities are equally responsible for the physical protection of the materials involved. No single person shall be able to access or use all components or quorum of shares of a single secret or private cryptographic key. Split knowledge is a condition under which two or more entities separately have key components that, individually do not convey any knowledge of the resultant cryptographic key. Procedures must require that plaintext key components stored in tamper-evident envelopes that show signs of tampering must result in the destruction and replacement of the set of components, as well as any keys encrypted under this key. No one but the authorized key custodian (and designated backup) shall have physical access to a key component prior to transmittal or upon receipt of a component. Mechanisms must exist to ensure that only authorized custodians place key components into tamper-evident packaging for transmittal and that only authorized custodians open tamper-evident packaging containing key components upon receipt. Pre-numbered, tamper evident bags shall be used for the conveyance of cleartext key components. Out of band mechanisms must exist to verify receipt of the appropriate bag numbers. ApplicabilityQuestion Scope This question applies to: all symmetric cryptographic key components when they are transmitted, conveyed or moved between two organizational entities. This applies to all symmetric cryptographic key components for all ATMs, PIN pads, PIN entry devices and network processor links to the site's host system for all directions of PIN flowincoming and outgoing. This question also applies to components of Master Keys and hierarchy keys. This question also applies to components of any keys used for internal PIN translations that may occur in the system, or keys used internally.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
32
Intent of Question To ensure the secrecy and integrity of key components and keys when key components are transferred, conveyed or moved between two organizational entities. Unlike the previous question, which examines the methods used to transport keys (as either cryptograms or key components), this question addresses the transfer of key components between business entities such as a Member bank and a processing network. This question refers to the methods in place to transport key components within a specific enterprise. (For example, this question is intended to ensure that key components are not compromised while they are being transported from secure storage to the data center where they will be entered into a TRSM.)
Audit Technique Interview appropriate personnel and examine documented procedures for the custody (and storage or destruction if applicable) of key components from the time of generation to the time of transmittal/loading, or for the time from receipt until the time of loading. Examine logs of access to the security containers to validate that only the authorized individual(s) accesses each component. Ensure that the principles of dual control and split knowledge are being strictly enforced. Diagram the process, as detailed in the written procedures and during conversations with the participants. Identify any points in the process when someone other than a designated key custodian holds a key component or when one person has physical control of all of the components of a key. Examine the key component storage arrangements. Ensure the container is secure and the custodian is the only person who has access to the contents. (For example, if the components are stored in a safe, they should be in different locked areas with the brass keys or combinations held by the designated custodians.) Dual Control No single person can gain control of a protected item or process. Split Knowledge The information needed to perform a process such as key formation is split among two or more people. No individual has enough information to gain knowledge of any part of the actual key that is formed. Ensure key components are NOT stored in unsecured desk drawers. (This is not robust enough for the purpose, and master brass keys are often held by facilities or maintenance staff.) Ensure multiple components are NOT stored in the same physical area within a safe or lockbox. Verify that the key custodian must participate in the process of retrieving the component and that no single person, whether designated as a custodian or not, can access all components of a key. Validate that whenever cleartext key components are conveyed between organizations they are conveyed using different communication channels (e.g., different courier services) and using pre-numbered, tamper evident bags and that out of band mechanisms exist to verify receipt of the appropriate bag numbers.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
33
DES refers to TDES keys with non-parity bits. The RSA key size refers to the size of the modulus. The Elliptic Curve key size refers to the minimum order of the base point on the elliptic curve; this order should be slightly smaller than the field size. The DSA key sizes refer to the size of the modulus and the minimum size of a large subgroup. AES may also be used with a key size of at least 128 bits. For Diffie-Hellman implementations: Entities must securely generate and distribute the system-wide parameters: generator g, prime number p, and parameter q, the large prime factor of (p 1). As described in ANSI X9.42, parameter p must be at least 1024 bits long, and parameter q must be at least 160 bits long. Each entity generates a private key x and a public key y using the domain parameters (p, q, g). Each private key shall be statistically unique, unpredictable, and created using an approved random number generator as described in the PCI PED POS (EPP) Derived Test Requirements. Entities must authenticate the Diffie-Hellman public keys using either DSA, a certificate, or a symmetric MAC (based on TDES see ISO 16609 Banking Requirements for message authentication using symmetric techniques Method 3 should be used).
RSA keys encrypting keys greater in strength then double length TDEA keys shall use a modulus of at least 2048 bits. An RSA key with a modulus of at least 1536 bits should be used to encipher double length TDEA keys.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 34
ApplicabilityQuestion Scope This question applies only to keys that are used to transmit other keys. It does not apply to keys that encrypt PINs. Applicable keys include symmetric cryptographic keys used in the Master Key Transaction Key management technique for ATMs, PIN pads, PIN entry devices and network processor links to the site's host system for all directions of PIN flowincoming and outgoing. Applicable keys also include asymmetric keys used to convey other keys. Intent of Question To ensure that encrypted keys are protected by encryption with keys that are as least as strong as they are. Ultimately to protect against a key exhaustion attack to protect the key that ultimately protects PINs.
Note: All DES cryptographic keys fall into one of three categories: A specific key is a Master key, used to encrypt other keys for storage as cryptograms in a device or host environment. A Key Encryption (Key Exchange, Key Transport, Key Encipherment) key is used to encipher a DES key during transport. This question involves these DES keys. These DES keys must be at least double length keys and use the TDEA in an encrypt, decrypt, encrypt mode of operation for key encipherment. A double or triple length DES key must not be encrypted with a DES key of a shorter length. A Working key is used to encipher the actual data, such as a PIN. Visa requires that all DES Key Exchange keys must be at least double length (32 hexadecimal characters).
Note: As of the publication date of this document, Visa has not set global dates for enforcement of the requirement for TDES. However for specific Visa Regional implementation dates contact your Visa Regional Risk Group. The industry is developing techniques for using asymmetric keys to distribute symmetric keys to remote devices. Such schemes may involve RSA keys to encrypt a TDES symmetric key. If implemented, the RSA key must use a key modulus of at least 1024 bits to be in compliance with this question. Audit Technique Based upon the network schematic, identify all key encipherment keys. This should include the master file key(s) used for interchange transactions. Interview appropriate personnel and examine documented procedures for the creation of these keys. This must be done to ensure that they are at least double length keys and use TECB or TCBC mode of operation for encryption if a DES key, and if a RSA key, it uses a key modulus size of at least 1024 bits. For all terminal link, network link, and if applicable, internal path (i.e., if using an Intermediate Key) for the host system that uses the Master Key Transaction (Session) Key key management method, examine the cryptograms of their key exchange keys and validate that all DES symmetric keys are 32 or 48 hexadecimal characters. If there are RSA asymmetric transport keys, validate that the RSA public key modulus is at least 1024 bits on all applicable terminal links and all applicable network links.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 35
Verify that no Key Exchange Key is shorter than the cryptographic keys that it protects and it is at least double length for a DES key; and if RSA, that it uses a key modulus of at least 1024 bits. Verify that if RSA is used to convey triple length DES keys or AES keys, then it uses a key modulus of at least 2048 bits. Examine the DES key cryptogram and ask the custodians to count the number of characters in each DES key component in order to verify compliance with this requirement. Examine the RSA public key modulus and count the number of characters to verify it is at least 1024 bits. Using the table above, validate the respective key sizes for DES, RSA, Elliptic Curve, and DSA algorithms that are used.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
36
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
37
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
38
ApplicabilityQuestion Scope This question applies to: Key loading to HSMs and PEDs. All keys (symmetric and asymmetric) and symmetric key components loaded to all ATMs, PIN pads, and PIN entry devices. The loading of any Master Key and hierarchy key components to a site's HSMs.
Intent of Question To ensure that no one knows the final key during key loading (knowledge of any one key component gives no knowledge of the final key). (For DES, the method to implement this is to enter the cryptographic key values as two or more components, each of which is equal in size to the actual key.) Audit TechniqueLoading into HSMs Interview appropriate personnel and review documentation to determine the procedures for key loading to the HSM. (This includes key loading of symmetric Master Keys for the CAs HSM, if a CA is used) Demonstration/walk through of the usage of any equipment (terminals, PIN pads, etc) used as part of the key loading process. Examine logs of access to security containers that passwords, PROMs, smartcards, brass keys, etc. are stored in to ensure dual control. Ensure key loading devices can only be accessed and used under dual control. Examine vendor documentation describing options for how the HSM MFK is created. Corroborate this with information gathered during the interview process and procedural documentation provided by the entity under review. Audit TechniqueLoading to PEDs Interview appropriate personnel and review documentation to determine the procedures for key loading to PEDs. Demonstration/walk through of the usage of any equipment (terminals, external PIN pads, key guns, etc) used as part of the key loading process. Examine logs of access to security containers for key components. For techniques involving public key cryptography, examine documentation and develop a schematic to illustrate the process, including the size and sources of the parameters involved, and the mechanisms utilized for mutual device authentication for both the host and the PED. Audit TechniqueLoading to Both HSMs and PEDs Interview appropriate personnel to determine the number of key components, the length of the key components, and the methodology used to form the key for each interchange related key identified in the network schematic. If other mechanisms do not exist to verify key component length, a custodian may be requested to examine a component stored on paper. Examine HSM and PED vendor documentation to determine the methodologies (XOR, DEA, Concatenation) supported for the combination of key components.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 39
Witness a structured walk through/demonstration of various key generation processes for all key types (MKs, AWKs, TMKs, etc.). Verify the number and length of the key components generated to information provided through verbal discussion and written documentation. Also verify that the process includes the entry of individual key components by the designated key custodians. Ensure check values from the HSM and verify that PED are the same during the key loading demonstration. Custodians do NOT hand their components to a third party to enter. Components are full-length (two or more components, each of which is equal in size to the actual key) and are NOT 8 character halves that are concatenated together. HSM brass keys are held under dual control., TRICKS, AND STRANOBSERVATIONS
While the requirement implies that keys can only be loaded from paper components with values entered by designated key custodians, other compliant methods exist. The most common nonpaper method is the entry of key components by means of "chip" cards or similar secure tokens, with each card holding one component. In all cases the principles of split knowledge and dual control must be followed.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
40
For keys transferred from the cryptographic hardware that generated the key to an electronic key-loading device: The key-loading device is a physically secure TRSM, designed and implemented in such a way that any unauthorized disclosure of the key is prevented or detected; and The key-loading device is under the supervision of a person authorized by management, or stored in a secure container such that no unauthorized person can have access to it; and The key-loading device is designed or controlled so that only authorized personnel under dual control can use and enable it to output a key into another TRSM. Such personnel must ensure that a key-recording device is not inserted between the TRSMs; and The key-loading device must not retain any information that might disclose the key or a key that it has successfully transferred.
The media upon which a component resides must be physically safeguarded at all times. Any tokens, EPROMs, or other key component holders used in loading encryption keys must be maintained using the same controls used in maintaining the security of hard copy key components. These devices must be in the physical possession of only the designated component holder and only for the minimum practical time. If the component is not in human comprehensible form (e.g., in a PROM module, in a smart card, on a magnetic stripe card, and so forth), it is in the physical possession of only one entity for the minimum practical time until the component in entered into a TRSM.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
41
If the component is in human readable form (e.g., printed within a PIN-mailer type document), it is only visible at one point in time to only one person (the designated component custodian) and only for the duration of time required for this person to privately enter the key component into a TRSM. Printed key component documents are not opened until just prior to entry. The component is never in the physical possession of an entity when any one such entity is or ever has been similarly entrusted with any other component of this same key. ApplicabilityQuestion Scope This question applies to Key loading mechanisms and the process of loading all cryptographic keys for all ATMs, PIN pads, PIN entry devices and network processor links to the site's host system for all directions of PIN flowincoming and outgoing. Key loading process of Master Keys and hierarchy keys. Key loading process of any keys used for internal PIN translations that may occur in the system, or keys used internally. Key loading process of Master Keys and hierarchy keys used by a CAs Host Security Module. Key loading process of all Public and Private key pairs used in the remote key establishment and distribution scheme.
Intent of Question To ensure: Security and integrity of keys during the key loading process into a TRSMspecifically to ensure no visual or electronic surveillance or monitoring occurs during the key transfer process. Secrecy and the integrity of keys transported from the location of generation to the location of loading in an electronic key loading device (KLD). Security of the KLD. That the KLD is a TRSM. The KLD is designed or controlled so it cannot output a key into another TRSM except under dual control.
Audit Technique Interview appropriate personnel and review documentation to determine the procedures for key loading to HSMs and PEDs and CAs HSMs. Review any logs of key loading. Ensure all documentation supports the key loading process is in accordance with this question's requirements. Observe/demonstration/walk through of the usage of any equipment (terminals, PIN pads, key guns, etc.) that is part of the key loading process. Inspect the environment(s) where key loading occurs. Ensure cameras cannot monitor the entering of key components.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 42
Ensure dual control mechanisms and dual control custody of the key loading devices and of the key loading process. Ensure the TRSM equipment is inspected for evidence of monitoring. Electronic monitoring would normally be accomplished by attaching taps on the cable between the PIN pad and the encryptor board or by tapping the line between the ATM and the host. Physical inspection of the device should be performed to identify and remove any such devices. Ensure there are no default dual control mechanisms (e.g., default passwords usually printed in the vendor's manualin a key loading device). Validate that key loading procedures include instructions to delete the keys from the key loading device after successful transfer.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
43
Intent of Question To ensure the secrecy and integrity of keys during the key loading process, specifically to contribute to this by ensuring dual control over the use of key loading devices. Audit Technique Interview appropriate personnel and review documentation to determine the procedures for the use of any key loading equipment or device enablers that are used for either HSMs and CAs HSMs or PEDs. Examine emergency procedures in order to determine whether dual control rules are violated under those circumstances. Inspect storage locations of key loading equipment (including physical brass keys used to enable loading, passwords, key guns, etc.) to ensure enforcement of dual control (procedural controls are not adequate). Review logs of equipment usage to determine documentation of dual custody and that only authorized individuals have access. Ensure dual control mechanisms and dual control custody of the key loading devices and of the key loading process.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 44
Ensure the TRSM equipment is inspected for evidence of monitoring. Ensure there are no default dual control mechanisms (e.g., default passwords usually printed in the vendor's manualin a key loading device). Verify that if passwords are used for key loading, they are under dual control., There was a bank with many HSMs, each of which had both copies of both brass keys dangling from the locks. Anyone with access to the data center, including guards, vendors, cleaners, and technical staff, could have turned the keys, hit the Reset button, lifted a tile, tossed the keys under the raised floor, and walked away, having put this major bank out of the ATM business for a considerable period of time. These keys usually come with a little aluminum tag containing a key number. Note this number because you will need it to get extra keys.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
45
ApplicabilityQuestion Scope This question applies to: Mechanisms (e.g., key check values, hashes, etc.) that validate the keys and key components that are loaded. Key loading validation mechanisms used to load all cryptographic keys for all ATMs, PIN pads, PIN entry devices and network processor links to the site's host system for all directions of PIN flowincoming and outgoing. Key loading validation mechanisms used to load Master Keys and hierarchy keys. Key loading validation mechanisms used to load any keys used for internal PIN translations that may occur in the system, or keys used internally.
46
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
Key loading validation mechanisms used to load Master Keys and hierarchy keys used by a CAs Host Security Module. Key loading validation mechanisms used to load all Public and Private key pairs used in the remote key establishment and distribution scheme.
Intent of Question To ensure the integrity and authenticity of keys after loading. To be able to validate that the key on the system is in fact the key that is desired to be on the system, (i.e., to ensure that the key was not tampered with, substituted, or compromised during the loading process). Audit Technique Interview appropriate personnel and review documentation (including both logs and procedural) to determine the mechanisms used to validate the authenticity of the keys loaded to HSMs and CAs HSMs and PEDs. Review vendor documentation to determine which methods of verification for key loading are supported. Observe a demonstration of the key loading process. If check values are used, compare key check values against those for known, default, test, predictable, easily guessed or simple keys. Such check values are often printed in vendor manuals. Validate that the devices (EPPs/PEDs and KDHs) involved in using public key schemes check the validity of other such devices involved in the communication prior to any key transport, exchange or establishment. Ensure this validation of authentication credentials occurs immediately prior to any key establishment. Examples of this kind of validation include checking current certificate revocation lists or embedding valid authorized key distribution host certificates in EPPs/PEDs and disallowing communication with unauthorized key distribution hosts. Inquire of personnel as to the mechanisms that are implemented. Verify that public keys exist in only the allowed storage forms - certificates, PKCS #10s, in a secure cryptographic device, encrypted, or have a MAC (Message Authentication Code) created using the algorithm defined in ISO 9807. Validate that mechanisms exist to prevent a non-authorized host from performing key transport, key exchange or key establishment with EPPs/PEDs. An example of this kind of mechanism is through limiting communication between the EPP/PED and hosts to only those hosts contained in a list of valid hosts managed by the EPP/PED. Inquire of personnel as to the mechanisms that are implemented. Validate that the remote key establishment or distribution scheme is implemented to preclude man in the middle attacks. Validate that the remote key establishment and distribution scheme implementation is designed such that there is no means available for man in the middle attacks. Validate that the remote key establishment and distribution scheme is designed and implemented to prevent replay attacks.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
47
If the public key scheme includes the embedding of valid authorized key distribution host certificates in EPPs/PEDs, then verify that the loading of these certificates, if done at key injection time, includes procedures to ensure only legitimate key distribution host certificates are loaded. Review documentation, interview key injection personnel, and witness the loading process to validate the authenticity of the certificates loaded into the EPPs/PEDs. If the Public/Private key pairs are generated external to the device that uses the key pair, validate that the key loading process provides for key protection. Review documentation, interview key injection personnel, and witness a key loading process to validate that the key pair is not tampered with, substituted or compromised during the transfer from the generation device to the target device. Also validate that the key pair is immediately deleted from the generation device (to ensure no other device can be loaded with the key pair) after successful loading to the target device.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
48
Audit Technique Review existing documentation for completeness. See Question 7 for details.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
49
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
50
Audit Technique Using the network schematic from the preliminary step, interview responsible personnel to determine which keys are shared between this and other entities (or possibly other organizational units of this entity). Examine system documentation to verify information provided during interviews. This is mandatory if personnel have indicated the use of unique keys with other organizations: Obtain check values for any master file keys and interchange based zone keys, including other interchange networks to verify key uniqueness. If a remote key establishment and distribution scheme is implemented between networks, obtain public keys and/or hash values and/or fingerprints of the keys for all other interchange networks to verify key uniqueness of the asymmetric key pairs. For internally developed systems, review system design documentation or source code for uniqueness of cryptograms and/or hash values and fingerprints, and public keys. For application packages, examine parameter files where the cryptograms of keys shared with other network nodes are specified (e.g., the KEYF file for Base 24. Ensure the correct number of cryptograms exist (account for each network link) and that there are unique values for each link. If a remote key establishment and distribution scheme is implemented between networks, examine the parameter files where the public keys of keys shared with other network nodes are specified and ensure the correct number of public keys exist (a unique one for each network link implemented). Examine PIN translation transactions in a trace log and ensure that the from cryptographic key does not equal the to cryptographic key (this assumes the keys are encrypted under the same variant of the same KEK).
Corroborate this information to what is determined during the review of key generation, storage and destruction. Compare all PIN encrypting key cryptograms on every network link to ensure there are no duplicates. Then compare all key encrypting key cryptograms on every network link to ensure there are no duplicates. Note: A PIN key may be the same as a key encrypting key but the cryptograms will be different if variants of the MFK are used to encipher different key types, although the check digit will be the same. Also, it is still possible to compare all PIN encrypting keys' cryptograms encrypted by the same value (i.e., MFK variant) to see if they are duplicates of each other, and then to separately compare all key encrypting keys' cryptograms encrypted by the same value (i.e., MFK variant) to see if they are duplicates of each other.) Similarly, if a remote key establishment and distribution scheme is implemented between networks, compare the public keys on ever network link to ensure there are no duplicates. Then compare all key encrypting key cryptograms on every network link to ensure there are no duplicates. Compare key check values against those for known, default, test, predictable, easily guessed or simple keys. Such check values are often printed in vendor manuals.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
51
Audit Technique Interview appropriate personnel and review techniques and procedural documentation pertaining to preventing key substitution. Ensure procedures/policy does not allow HSMs (including CAs HSMs) to remain in the authorized state when connected to online production systems.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 52
Ensure that keys no longer needed are destroyed, especially those keys used to encipher other keys for distribution. Ensure there is some velocity checking on multiple cryptographic synchronization errors (PIN synchronization errors) and ensure procedures exist to investigate such occurrences. Those procedures need to include specific actions that determine whether the legitimate value of the cryptographic key has changed, such as encryption of a known value to determine whether the resulting cryptogram matches the expected result. The procedures need to ensure that proactive safeguards are in place that shut down the source of any synchronization errors and start an investigative process to determine the true cause of the event. Ensure controls exist over the access to and use of devices (e.g., QKTs and SCTs) used to create cryptograms. In the case of paper components, review procedures and discuss with key custodians the steps that are taken whenever a key component appears to have been tampered with. These procedures must include a requirement to immediately replace any key whose components may have been tampered with as well as any key ever stored or transported under the suspect key. Validate that EPPs/PEDs only communicate with CAs for the purpose of certificate signing or for key injection where the certificate issuing authority generates the key pair on behalf of the EPP/PED; and with Key Distribution Hosts (KDHs) for key management, normal transaction processing and certificate (entity) status checking. Validate that KDHs only communicate with EPPs/PEDs for the purpose of key management and normal transaction processing; and with CAs for the purpose of certificate signing and certificate (entity) status checking., TRICKS, AND STRANGE OBSERVATIONS TIPS, TRICKS, AND STRANGE OBSERVATIONS Why would anybody do this, given that the transaction will not go through successfully? One scenario has an attacker tapping into outbound messages from an ATM, which is not difficult to do from dial-up devices. By substituting a key, he can decrypt PIN blocks until the device is reset. With the PIN (that he decrypted) and the account data (from the stripe), a counterfeit card is just a hotel key and an encoder away. By the way, one common reaction is for new keys to be downloaded from the Host. If an attacker has tapped into the line and knows the encryption key used to protect the new PIN Encryption key, the downloaded new key is also ascertainable. This is another strong argument for the implementation of unique keys in all devices.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
53
Public key based implementations must provide mechanisms for restricting and controlling the use of public and private keys. For example, this can be accomplished through the use of X.509 compliant certificate extensions. CA and KDH private keys cannot be shared between devices except for load balancing and disaster recovery. EPP and POS PED private keys cannot be shared.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
54
ApplicabilityQuestion Scope This question applies to: All cryptographic keys used at all ATMs, PIN pads, PIN entry devices, and network processor links connected to the site's host system and for all directions of PIN flow incoming and outgoing. Any keys used for internal PIN translations that may occur within the host system (e.g., if the application uses a Switch Working Key or SWK, or Intermediate Key). All Master Keys or hierarchy keys used in the system. This question applies to all keys in both the test and production environments. Master Keys and hierarchy keys used by a CAs Host Security Module.. All Public and Private key pairs used in the remote key establishment and distribution scheme.
Intent of Question To: Minimize damage that can result from a key compromise. Ensure that test keys are not used in a production environment and to ensure that production keys are not used in a test environment. Ensure there is a separation of keys to minimize misuse (for example so that HSMs cannot be tricked into decrypting PINs with a Decrypt Data command through the use of a mechanism that ensures that the commands recognize the purpose of the keys and force the use of separate types of keys).
Audit Technique Using the network schematic from the preliminary step, interview responsible personnel to determine which keys exist at various points in the interchange process, whether any keys are used to encipher other keys and to encipher any data (including PIN blocks) and whether keys are shared between production and test. Obtain check values for master file keys for both production and test environments and ensure they are different values. This applies to CAs also. Examine the cryptograms and key check values in both the production and test systems to ensure that all keys are different. Examine hash and/or fingerprint values in both production and test systems to ensure asymmetric keys are different. Examine system documentation to verify information provided during interviewsthis is mandatory if personnel have indicated the use of unique keys. Coordinate this with steps in questions 17 and 20. Ensure that if new PIN Encryption Keys are periodically downloaded to an ATM, the new PEK must not be encrypted under the old PEK. Examine certificates to ensure that production keys have been issued production certificates (i.e., that the CA has used a production key to sign the certificate issued for production public keys). Verify that a test key hierarchy exists for obtaining test certificates from the CA signed by a test key. Examine the certificate database on the CA system. Examine the certificate requests and certificate database on the host system.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 55
Observe the process and determine that key pairs are not reused for certificate renewal or replacement. Examine the certificate database on the CA system. Witness a demonstration of certificate request and validate that the steps include the generation of a unique key pair before constructing the certificate request. Validate that mechanisms are utilized to preclude the use of a key for other than its designated and intended purpose (i.e., keys are used in accordance with their certificate policy). Validate that Certification Authority (CA) certificate/certificate (entity) status checking (for example CRL) signature keys, or signature keys for updating valid/authorized host lists in EPPs/PEDs cannot be used for any other purpose, other than subordinate entity certificate requests, certificate status checking, and self-signed root certificates. The keys used for certificate signing and certificate (entity) status checking (and if applicable, self-signed roots) may be for combined usage, or may exist as separate keys dedicated to either certificate signing or certificate (entity) status checking. Examine the CA system certificate issuance menu options and/or application options for issuing certificates. Examine the CA systems certificate database to validate. Validate that CAs that issue certificates to other CAs cannot be used to issue certificates to EPPs or PEDs. Witness a demonstration of the CAs certificate issuance menu options and/or application options for issuing certificates. Obtain and validate this is stated in the Certificate Policy. Validate that Public keys are only used for either encryption or for verifying digital signatures, but not both (except for EPPs/PEDs) and that Private keys can only be used for decryption or for creating digital signatures, but not both (except for EPPs/PEDs). Validate that X.509 compliant certificate extensions are used for restricting and controlling the use of public and private keys. If X.509 certificates are not used, obtain information on what techniques are used to produce the same result. Validate that CA and KDH private keys are not shared between devices except for load balancing and disaster recovery. Examine cryptograms of the private keys encrypted under the systems Master Key and validate that they are unique per device. Validate that EPP and POS PED private keys are not shared Verify that private keys are only used for digital signatures or decryption.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
56
Note: A PIN key may be the same as a symmetric encrypting key, but the cryptograms will be different if variants of the MFK are used to encipher different key types, although the check digit will be the same. Also, it is still possible to compare all PIN encrypting keys' cryptograms encrypted by the same value (i.e., MFK variant) to see if they are duplicates of each other, and then to separately compare all symmetric key encrypting keys' cryptograms encrypted by the same value (i.e., MFK variant) to see if they are duplicates of each other.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 57
Intent of Question To: Compartmentalize the risk associated with disclosure of a device key, so that the risk is limited to just that one device, and so that the discovery of that one key does not provide information to determine the key in any other device. Eliminate the use of known keys. To avoid the use of default, test, predictable, easily guessed or simple keys (e.g., 0123456789ABCDEF, alternating 0s and 1s, etc.).
Audit Technique Interview responsible personnel to determine which keys are shared between multiple PEDs. Examine system documentation to verify information provided during interviews. This is mandatory if personnel have indicated the use of unique keys per PED: Obtain check values for a sample of symmetric PEDs keys (both TMKs and PEKs) to verify key uniqueness. Obtain public key values and/or hash and fingerprint values for asymmetric keys to verify key uniqueness of asymmetric keys. For internally developed systems, review system design documentation or source code (or any program/compiled files) for uniqueness of cryptograms and/or asymmetric keys. For application packages, examine parameter files where the cryptograms of symmetric keys used for PEDs are specified (e.g., the TDF file for Base 24), and where the public keys for PEDs are specified. Examine PIN translation transactions in a trace log and ensure that the from cryptographic key does not equal the to cryptographic key (this assumes the keys are encrypted under the same variant of the same KEK).
Corroborate this information to what is determined during review of key generation, storage and destruction. Have the technical staff sort all of the key encrypting key cryptograms for every terminal link, and sort all of the PIN encrypting key cryptograms for every terminal link. Ask for a printout of the sorted information including the terminal ID numbers and check digits if available. Compare all PIN encrypting key cryptograms on every terminal link to ensure there are no duplicates. Then compare all key encrypting key cryptograms on every terminal link to ensure there are no duplicates. Note: A PIN key may be the same as a key encrypting key but the cryptograms will be different if variants of the MFK are used to encipher different key types, although the check digit will be the same. Also, it is still possible to compare all PIN encrypting keys' cryptograms encrypted by the same value (i.e., MFK variant) to see if they are duplicates of each other, and then to separately compare all key encrypting keys' cryptograms encrypted by the same value (i.e., MFK variant) to see if they are duplicates of each other). Compare key check values for all keys on all terminal links to ensure there are no duplicates. Similarly, for asymmetric keys, sort all of the public keys for every terminal link as well as the above KEK and PEK cryptograms for every terminal link. Compare all public keys to ensure there are no duplicates.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
58
Compare key check values against those for known, default, test, predictable, easily guessed or simple keys. Such check values are often printed in vendor manuals. Perform a comparison check between the number of devices being operated and the number of cryptographic keys in use. If there are fewer keys than devices, it is clear that the same key is being used in several places. Examine "emergency" procedures in an attempt to identify situations where otherwise compliant procedures are violated. Such emergency procedures are sometimes invoked when an ATM goes out of service after normal business hours or when certain staff members are not available. Ensure these procedures support this question's requirements for unique PED keys., TRICKS, AND STRANGE OBSERVATIONS TIPS, TRICKS, AND STRANGE OBSERVATIONS Although the use of unique keys in each PIN entry device has been required by ANSI since 1982, by Visa since the early 1990s, and by Plus since 1998, it still elicits both surprise and resistance from many entities. Some arguments stated against compliance are:
"We have too many ATMs." "Our ATMs are spread too far." "I can't afford to send two people to start an ATM." Several banks are in full compliance with more than 8,00 ATMs. A Canadian bank with ATMs spread 4,000 miles East to West, with a number North of the Arctic Circle is in full compliance The typical ATM only needs to have a key reloaded less frequently than once a year because of battery-backed RAM. The institution promised to follow all the rules when it signed up. Your software is totally unsuitable for the current environment. If you wrote it, fix it; if you bought it, tell the supplier to fix it. Work through a User Group, if one exists. Maybe put one in the money vault and the other in a little strongbox glued or welded to the ATM. (Be clever, you'll come up with something appropriate.) (Note that this is only necessary if you are intending to reuse the same keys in the event the ATM loses its key(s) because of an extended power outage). Make it a weekend project with pizzas and sodas provided as lunch.
Visa has been working with ATM manufacturers, software and hardware suppliers, and a representative sample of members to develop a methodology that uses asymmetric cryptography to download unique DES keys to ATMs, eliminating the need for human interaction. Certain forward-looking members are already implementing methods like this. As you decide upon a unique key strategy, keep these developments in mind and feel free to contact Visa for the most current information.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
59
A double- or triple-length DES key must not be encrypted with a DES key of a shorter length. Symmetric secret keys may be enciphered using public key cryptography for distribution to PEDs as part of a key-establishment protocol as defined in Requirement 12. The following requirements apply to entities participating in remote key establishment and distribution applications:
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 60
Private keys used to sign certificates, certificate status lists, messages or secret key protection must only exist in one of the following forms: Within a secure cryptographic device, e.g. a HSM or EPP/PED that meets applicable PCI requirements for such a device Encrypted using an algorithm and key size of equivalent or greater strength As components using a recognized (e.g., Shamir) secret sharing scheme.
ApplicabilityQuestion Scope This question applies to all keys used to encrypt PINs and to all keys (symmetric and asymmetric) used to encrypt those keys. Intent of Question To ensure clear keys are not exposed across network links or on databases, software programs, computer memory, electronic media, or system logs, backup tapes, etc. Audit Technique Using the network schematic from the preliminary step, interview responsible personnel to determine which keys are stored as components and on which type of media they are stored (paper, PROM, smartcard, etc.). Keys that will probably be managed as components include ATM initialization keys (TMKs), Base derivation keys (BDKs), Master keys and Key Exchange Key components shared with other networks and possibly asymmetric keys stored using a recognized (e.g., Shamir) secret sharing scheme (not really components). Examine documented procedures to determine the algorithms and key sizes used for storing encrypted keys. Examine vendor documentation describing options for usage of key encipherment keys (both symmetric and asymmetric). Corroborate this with information gathered during the interview process and procedural documentation provided by the entity under review. Physically verify the location of all interchange based key components, including the inspection of any containers for those components. For each of the keys identified in the first paragraph above under Audit Technique, identify the key custodians and perform a physical inventory to verify that each symmetric key is managed as two or more full-length components. Be alert for instances where both components of a symmetric key are stored together or where the nonrandom test value is not stored at all, but rather known to a number of current and former employees and third party staff. Identify all individuals with access to components and trace that access to key custodian authorization forms. Examine logs of access to the key components to ensure only authorized custodians access components, PROMs, smartcards, etc., including verification of tamper evident serial numbers. Ensure there are no clear keys stored in containers, in databases, on floppy disks, and in software programs (as is done when performing software PIN translates). Ensure key components are not XOR'ed or otherwise combined in software programs.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
61
Ask to see inside the key entry area of one or more production ATMs. Often, start-up instructions and other notes used by service technicians are kept here. In a number of cases, a review of these startup instructions reveals that the initialization key values are written in the clear at the point in the checklist where the DES keys are entered. This is obviously a major breach of security as the initialization keys as well as all the keys that they protect are now compromised. Also review operations manuals to ensure that no confidential information has been written "in the margins. Inspect key-loading procedures for HSMs to ensure that no key component values have been recorded in inappropriate places. Validate RSA keys have a key modulus of at least 1024 bits. Validate that private keys used to sign certificates, certificate status lists, messages or secret key protection only exist in one of the above outlined approved forms., TRICKS, TIPS, TRICKS, AND STRANGE OBSERVATIONS Here is where we find the greatest disparity between theory and practice. While many institutions have staff members who understand that the only security offered by DES lies in maintaining the confidentiality of the key, we often find keys managed as cleartext strings, written in the clear in documents or dictated over the telephone, sometimes to people claiming to be third-party personnel. Promote the use of pre-numbered, tamper-evident envelopes for key component storage. These envelopes, plus a log, can completely document whether an unauthorized access has been made. Remember, having a break-in is bad enough, but having a break-in and not being aware of it is infinitely worse.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
62
If attempts to load a secret or private key or key component into a cryptographic device fail, the same key or component must not be loaded into a replacement device unless it can be ensured that all residue of the key or component has been erased or otherwise destroyed in the original device. The following requirements apply to entities participating in remote key establishment and distribution applications: In order to provide for continuity of service in the event of the loss of a root key (e.g., through compromise or expiration), a key distribution management system and the associated end entities (EPPs, KDHs, POS PEDs) should provide support for more than one root. Root CAs must provide for segmentation of risk to address key compromise. An example of this would be the deployment of subordinate CAs.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 63
Mechanisms must be in place to address compromise of a CA due to, for example, key compromise or mismanagement. This must include procedures to revoke subordinate certificates and notify affected entities. The CA must cease issuance of certificates if a compromise is known or suspected and perform a damage assessment, including a documented analysis of how and why the event occurred. In the event of the issuance of phony certificates with the compromised key, the CA should determine whether to recall and reissue all signed certificates with a newly generated signing key. Mechanisms (e.g., digital time stamping) must exist to ensure that phony certificates cannot be successfully used. The compromised CA must notify any superior or subordinate CAs of the compromise. Subordinate CAs and KDHs should have their certificates reissued and distributed to them or be notified to apply for new certificates. Minimum cryptographic strength for the CA system shall be: Root minimum RSA 2048 bits or equivalent Subordinate CAs, EPP/PED devices and KDHs minimum RSA 1024 bits or equivalent
The following key pair lifecycle shall exist: Expiration of EPP/PED keys within twelve (12) months after the expected end-of-life of the device Expiration of KDH keys every five years, unless another mechanism exists to prevent the use of a compromised KDH private key.
ApplicabilityQuestion Scope This question applies to the key compromise procedures that need to exist for all cryptographic keys for all ATMs, PIN pads, PIN entry devices and network processor links to the site's host system for all directions of PIN flowincoming and outgoing. This question also refers to Master Keys and hierarchy keys, and any keys used for internal PIN translations that may occur in the system or keys used internally, Master Keys and hierarchy keys used by a CAs host system, and all Public and Private key pairs used in the remote key establishment and distribution schemes.. This question also applies to all subsidiary keys of compromised keys. Intent of Question To ensure a proactive, well-conceived, (not reactive) plan is established for expedient and efficient execution should a key compromise occur, in order to minimize the fraudulent activities and also the potential adverse effects to other organizations that may result due to key compromise, and to effectively communicate such to all interested parties. Audit Technique Interview appropriate personnel and examine documented procedures to determine the adequacy of key compromise procedures.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
64
If written procedures do not exist for replacing compromised keys, the institution is out of compliance. If written procedures do exist, review them to verify that all of the steps needed to generate and deploy a random key are in place. Also verify that for each key in the institution's key suite, the keys protected or transported under each key are listed. This allows the recovery team to assess the scope of the recovery process. Ensure that the procedures include the names and/or functions of each staff Member assigned to the recovery effort, as well as phone numbers and the place where the team is to assemble. Validate the existence of more than one root for key distribution management systems. Validate Root CAs support subordinate CAs. Validate procedures for compromise of a CA includes procedures to revoke subordinate certificates and to notify affected entities. Validate the CAs key compromise procedures include the steps that it will cease issuance of certificates if a compromise is known or suspected, and will perform a damage assessment, including a documented analysis of how and why the event occurred, and that the CA will determine whether to recall and reissue all signed certificates with a newly generated signing keys. Validate that CAs have mechanisms to ensure that phony certificates cannot successfully be used. Validate that compromised CAs will notify superior or subordinate CAs, and will ensure that subordinate CAs and KDHs will have their certificates reissued and distributed to them or will be notified to apply for new certificates. Validate the minimum cryptographic strength for the CA will be for a Root to have a minimum RSA 2048 bits or equivalent, and subordinate CAs, EPP/PED devices and KDHs to have a minimum RSA 1024 bits or equivalent. Validate that the expiration of EPP/PED keys are within twelve months after the expected endof-life of the device, and that the expiration of KDH keys are every five years, unless another mechanism exists to prevent the use of a compromised KDH private key.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
65
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
66
Intent of Question To prevent the misuse or mismanagement of the inactive key that could potentially lead to compromise of data and loss of integrity to the active system, and to minimize the damage to the active key hierarchy should the inactive key be compromised. Audit Technique Interview responsible personnel and identify all keys that have been destroyed. Examine all logs of destruction. Note: All key encipherment keys should be traceable to either storage or destruction. Examine key history logs and key destruction logs to determine compliance.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
67
During the physical inventory of key components, be alert for any envelopes that cannot be accounted for on the list of keys expected to be stored in the container. It is not uncommon to find keys that were in use by entities that have been absorbed by merger or keys linking the institution to networks that no longer exist. Be particularly alert for Master File keys that have been replaced. Search for Visa-supplied key components, referred to as a Zone Control Master Key (ZCMK). There is a Visa requirement that these components must be destroyed shortly after the key has been successfully loaded to the system., TRICKS, AND STRANGE OBSERVATIONS TIPS, TRICKS, AND STRANGE OBSERVATIONS You may run into someone who is reluctant to allow key components to be destroyed. "What if we need to reload it in the future?" is the usual refrain. Remind anyone who says this that as long as you have copies of the Master key and cryptograms of the other keys encrypted under the Master, you can reload the Master key and copy the cryptograms back to the database, thus restoring all of the keys. One good trick is to have the affidavit of destruction as a part of the same piece of paper that contains the key component value itself. To destroy the key, tear off the section of the sheet that contains the value, destroy it, sign and witness the affidavit and log it.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
68
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
69
The CA shall require a separation of duties for critical CA functions to prevent one person from maliciously using a CA system without detection; the practice referred to as split knowledge and dual control. At a minimum, there shall be multi-person control for operational procedures such that no one person can gain control over the CA signing key(s). For systems accessible via non local console access the operating system(s) utilized must be hardened. Services that are not necessary or that allow nonsecure access (e.g., rlogin, rshell, etc. commands in Unix) must be removed or disabled. Unnecessary ports must also be disabled. Documentation must exist to support the enablement of all active services and ports. Vendor default IDs which are required only as owners of objects or processes, or for installation of patches and upgrades, must be disabled from login except as necessary for a documented and specific business reason. Vendor default IDs such as Guest must be removed or disabled. Default passwords must be changed during initial installation. Audit trails must include, but not be limited to all key management operations, such as key generation, backup, recovery, compromise, and destruction and certificate generation or revocation, together with the identity of the person authorizing the operation and persons handling any key material (such as key components or keys stored in portable devices or media). The logs must be protected from alteration and destruction, and archived in accordance with all regulatory and legal requirements. Records pertaining to certificate issuance and revocation must at a minimum be retained for the life of the associated certificate. Logical events are divided into operating system and CA application events. For both events the following will be recorded in the form of an audit record: Date and time of the event, Identity of the entity and/or user that caused the event, Type of event, and Success or failure of the event.
CA application logs must use a digital signature or a symmetric MAC (based on TDES see ISO 16609 Banking Requirements for message authentication using symmetric techniques mechanism for protection from alteration. The signing/MACing key(s) used for this must be protected using a secure cryptographic device. Components of the system operated online, for example the RA, must include for operational support the use of pass phrase management techniques encompassing at a minimum the following: Minimum length of six characters using a mix of alphabetic, numeric, and special characters. System enforced expiration life not to exceed thirty days. System enforced minimum life of at least one day. Maximum invalid attempts not to exceed five before suspending the user ID. System enforced pass phrase history preventing the reuse of any pass phrase used in the last twelve months. Initial assigned pass phrases are pre-expired (user must replace at first logon).
70
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
Vendor default pass phrases are changed at installation and where applicable, for updates. Pass phrases are not stored on any of the systems except in encrypted form or as part of a proprietary one way transformation process, such as those used in Unix systems.. The embedding of pass phrases in shell scripts, command files, communication scripts, etc., is strictly prohibited.
Log-on security tokens (e.g., smart cards) and cryptographic devices are not subject to the pass phrase management requirements for maximum and minimum lives as stated above. Security tokens must have associated PINs/pass phrases to enable their usage. The PINs/pass phrases must be at least six characters. The on-line Certificate Processing system components must be protected by a firewall(s) and intrusion detection systems from all unauthorized access including casual browsing and deliberate attacks. Firewalls must minimally be configured to: Deny all services not explicitly permitted. Disable or remove all unnecessary services, protocols and ports. Fail to a configuration that denies all services, and requires a firewall administrator to reenable services after a failure. Disable source routing on the firewall and external router. Not accept traffic on its external interfaces that appears to be coming from internal network addresses. Notify the firewall administrator in near real time of any item that may need immediate attention such as a break-in, little disk space available, or other related messages so that an immediate action could be taken. Run on a dedicated computer: All non-firewall related software, such as compliers, editors, communications software, etc., must be deleted or disabled.
Online systems must employ individually or in combination network and host based Intrusion Detection Systems (IDS) to detect inappropriate access. At a minimum, database servers and the application servers for RA and Web, as well as the intervening segments must be covered. ApplicabilityQuestion Scope This questions applies to: All cryptographic keys used at all ATMs, PIN pads, PIN entry devices, and network processor links connected to the site's host system and for all directions of PIN flow incoming and outgoing. Any keys used for internal PIN translations that may occur within the host system (e.g., if the application uses a Switch Working Key or SWK, or Intermediate Key). All Master Keys or hierarchy keys used in the system. Master Keys and hierarchy keys used by a CAs Host Security Module. All Public and Private key pairs used in the remote key establishment and distribution scheme.
71
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
Intent of Question To reduce the possibility of key compromise. This is ultimately to protect against PIN compromise. Audit Technique Interview responsible personnel and identify all individuals with access to components and trace to key custodian authorization forms. Compare information to the individuals who open secure containers. Examine logs of access to keys and key materials to ensure only authorized custodians access components, PROMs, smartcards, etc., including verification of tamper evident serial numbers. Validate that the systems have logical security controls that protect from unauthorized access, modification, substitution, insertion or deletion. Validate that all user access is directly attributable to an individual user, and are restricted to actions authorized for that role through the use of a combination of CA software, operating system and procedural controls. Examine the operating system and application to ensure they require individual user ID logon. Validate that any guest or group user IDs are disabled. Obtain and examine CAs certificate security policy and certification practice statement and verify that all the above-mentioned requirements are included in those documents. Verify implementation of these (not just that the requirements are documented but that they are also implemented), for example, ensure the CA is offline by examining network connections, verify the CA and RA software updates are only done locally at the console, validate non-console access requires two-factor authentication by witnessing such a login by staff, etc. Validate CAs require separation of duties for critical CA functions by witnessing operational procedures. Examine and validate that unnecessary services and ports are disabled. Obtain documentation that supports the enablement of all active services and ports. Validate default passwords are changed. Examine audit trails and validate they include all of the above-mentioned requirements. Validate records pertaining to certificate issuance and revocation are retained for the life of the associated certificate. Validate the fields for recorded events include the minimum specified above in the requirements. Validate the CA application logs are protected via a digital signature or symmetric MAC mechanism and that the mechanism is protected using a secure cryptographic device. Verify the pass phrase management techniques comply with those stated above in the requirements. Verify that the CA system components are protected by firewall(s) and intrusion detection systems. Validate the firewalls are minimally configured as required above. Verify the existence of network and host based Intrusion Detection Systems for the online CA systems, and that they protect the minimum servers stated above., TRICKS, AND
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 72
TIPS, TRICKS, AND STRANGE OBSERVATIONS On more than one occasion, we have discovered that the people that had access to safes containing key components had not been designated as key custodians. This meant that the designated key custodians had responsibility without authority. Remember, designated or not, the people that can gain access to the components are de facto key custodians and assignments should be made accordingly.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
73
Intent of Question To maintain an audit trail of access to stored cryptographic materials. Audit Technique Review logs for completeness. Inspect logs for any discrepancies. Attempt to identify anomalies, such as a key that remained out of storage for an excessive time or an access that did not have a corresponding key load event.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
74
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
75
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
76
RAs must retain documentation and audit trails relating to the identification of entities for all certificates issued and certificates whose status had changed for the life of the associated certificates. ApplicabilityQuestion Scope This question applies to written procedures that describe how all cryptographic keys are administered. Intent of Question To ensure that: Adequate and appropriate documented written procedures exist for the administration of all cryptographic keys. Documented procedures are followed, and that keys are not administered in any other (especially non-compliant) manner.
Audit Technique Review existing documentation for completeness. See Question 7 for details. Verify that CA operations are dedicated to certificate issuance and management. Validate that all physical and logical CA system components are separated from key distribution systems. Obtain and verify that CA operators have developed a certification practice statement as defined above. Obtain and verify procedures exist and are followed to validate identities of certificate requestors and recipients. Validate that the verification includes all of the bullets specified above.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
77
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
78
d) Each cryptographic device is carefully inspected and perhaps tested immediately prior to key-insertion using due diligence. This is done to provide reasonable assurance that it is the legitimate device and that it has not been subject to any unauthorized modifications. Devices incorporate self-tests to ensure their correct operation. Devices must not be reinstalled unless there is assurance they have not been tampered with or compromised. Controls must exist and be in use to ensure that all physical and logical controls and anti-tamper mechanisms used are not modified or removed.
Documented inventory control and monitoring procedures must exist to track equipment by both physical and logical identifiers in such a way as to: protect the equipment against unauthorized substitution or modification until a secret key has been loaded into it, and detect lost or stolen equipment.
Procedures must include ensuring that a counterfeit device possessing all the correct operational characteristics plus fraudulent capabilities has not been substituted for a legitimate device. Notwithstanding how the device is inspected and tested, it is mandatory to verify the device serial number against the purchase order, invoice, waybill or similar document to ensure that device substitution has not occurred. Documents used for this process must be received via a different communication channel (i.e., the control document used must not have arrived with the equipment). PIN-processing equipment shall only be used for its specified purpose. It must not be possible for the equipment to be operated in an unauthorized manner or beyond the scope of the operating procedures specified for the equipment. The security policy enforced by the HSM must not allow unauthorized or unnecessary functions. HSM API functionality and commands that are not required in PIN processing equipment to support specified functionality must be disabled before the equipment is commissioned. For example, PIN change functionality or PIN block format translation functionality may not need to be supported or can be limited. ApplicabilityQuestion Scope This applies to all cryptographic equipment from the time of manufacture or removal of service to the time of initial key loading. Intent of Question To: Determine that only legitimate equipment is used and is operating properly and that equipment has not been subject to unauthorized modifications/tampering prior to loading keys. Prevent the ability to monitor and gain knowledge of keys and components during loading and use. Prevent equipment awaiting deployment from being tampered with prior to possessing secret keys that would zeroized upon tamper.
79
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
Audit Technique Examine documentation and interview appropriate personnel. To ensure that: Devices are not deployed into production using default or test keys or data. Physical inspection and testing of the equipment occur immediately prior to key loading. Procedures ensure that inventory practices accurately track cryptographic equipment, including devices used for key loading. The equipment is physically protected to prevent or detect access by unauthorized personnel from the time of manufacture or removal from service to the time of initial key loading. For example: 1. Bonded carrier. 2. Device Authentication code injected by terminal vendor and verified by the terminal deployer. 3. Tamper evident packaging. Review all written purchasing, receipt and deployment procedures. It is crucial that these procedures include a step that verifies the actual machine serial number against the serial number from the shipping waybill or manufacturer's invoice. Validate the documents used for this process were not shipped with the equipment i.e., that they were sent via a separate communication channel. Then discuss what pre-installation inspections take place. These should include both physical and functional tests as well as a thorough visual inspection. Review how equipment is received and where it is "staged." It should remain in the original packaging until it is installed, unless it is received and staged at a secure facility. Be alert to gaps in the process that would allow an adversary to tamper with a device before it is placed into service. Ascertain how serial numbers are loaded to the institution's asset register in order to determine if the identity of the installed device is known at the time of installation, or only later. TIPS, TRICKS, AND STRANGE OBSERVATIONS One clever method for bringing equipment into service is to use a well-designed script. Have the installation technician initial each step of the process and store the completed (and initialed) script in a log.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
80
If necessary to comply with the above, the device must be physically destroyed so that it cannot be placed into service again, or allow the disclosure of any secret data or keys. ApplicabilityQuestion Scope This question applies to all TRSMs that are removed from service. Intent of Question To protect against the unauthorized use of a production-cryptographically-capable device. To protect against the disclosure of cryptographic keys and ultimately the disclosure of PINs.
Audit Technique Interview appropriate personnel and review documentation of procedures to ensure that a proactive practice exists to ensure that cryptographic devices removed from service have all keys and keying materials destroyed. Ensure that this process is also performed on all equipment being returned for repair. ATMs and PIN pads removed from service can retain cryptographic keys (including PIN Encryption keys) in battery-backed RAM for days or weeks. Proactive key removal procedures must be in place to delete all such keys from equipment being removed from the network. Host/Hardware Security Modules can also retain keys and of course, the Master File key is resident within these devices. Therefore, proactive key removal procedures must also be in place for HSMs.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
81
Cryptographic equipment must be managed in a secure manner in order to minimize the opportunity for key compromise or key substitution. Physical keys, authorization codes, passwords, or other enablers must be managed so that no one person can use both the enabler(s) and the device which can create cryptograms of known keys or key components under a key encipherment key used in production. Unauthorized use of secure cryptographic devices (including key loading devices) shall be prevented or detected by: The device is at all times either locked or sealed in a tamper-evident cabinet or else is under the continuous supervision of at least two authorized people who ensure that any unauthorized use of the device would be detected; The device has functional or physical characteristics (e.g. passwords or physical highsecurity keys) that prevent use of the device except under the dual control of at least two authorized people, and when in a state in which it is useable, the device is under the continuous supervision of at least two such people who ensure that any unauthorized use of the device would be detected.
The following requirements apply to entities participating in remote key establishment and distribution applications: CA and RA database and application servers, and cryptographic devices must reside in a physically secure and monitored environment. The physically secure environment must restrict access to only authorized personnel. The physically secure environment must have an intrusion detection system and restricted access via, for example, locks or tokens. Documented procedures exist for the granting and revocation of access privileges, which include reviewing manual or electronic logs of accesses. Specifically, Certificate Processing operations must: Operate in a physically secure dedicated room not used for any other business activities but certificate operations (stand-alone). Provide for the documentation of all access granting, revocation, and review procedures and of specific access authorizations, whether logical or physical. Require dual control access. The room must never be occupied by a single individual for more than thirty (30) seconds. The enforcement mechanism must be automated. The system must enforce anti-pass-back. Use electronically (e.g., badge and/or biometric) managed dual occupancy.
82
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
Allow access only to pre-designated staff with defined business needs and duties. Visitors must be authorized and escorted at all times. Use CCTV monitoring (motion activated systems that are separate from the intrusion detection system may be used) of the CA operating platform which must record to time lapse VCRs or similar mechanisms. Surveillance cameras must not be configured to allow the monitoring of computer screens, keyboards, PIN pads, etc. Require that personnel with access to the physically secure environment must not have access to the media (e.g., VCR tapes, digital recording systems, etc.) with the recorded surveillance data. Images recorded from the CCTV system must be securely archived for a period of no less than forty-five days. Systems using digital recording mechanism must have sufficient redundancy to prevent the loss of information necessary to reconstruct events for the most recent forty-five day period. Provide for continuous (motion activated systems may be used) lighting for cameras. Have a 24/7 intrusion detection system of the physically secure environment. Protect the secure area by motion detectors when unoccupied. This must be connected to the alarm system and automatically activated every time all authorized personnel have exited the secure area. Any windows in the secure area must be locked, protected by alarmed sensors, or otherwise similarly secured. Use access logs to record personnel entering the secure room, including documented reasons for the access. The logs may consist of either electronic, manual or both. Visitors must sign an access log detailing name, organization, date and time in and out and purpose of visit. The person escorting the visitor must also initial the log. Tie all access control and monitoring systems to an Uninterruptible Power Source (UPS). Document all alarm events. Under no circumstances shall an individual sign-off on an alarm event in which they were involved. Establish that the use of any emergency entry or exit mechanisms must cause an alarm event. Require that all alarms for physical intrusion necessitate an active response by personnel assigned security duties within thirty minutes. Implement a process for synchronizing the time and date stamps of the access, intrusion detection and monitoring (camera) systems to ensure accuracy of logs. This may be done by either automated or manual mechanisms. If a manual process is utilized, then the process must occur at least quarterly. Documentation of the synchronization must be retained for at least a one-year period.
Root CAs and their equivalent operations must exist only in a high security environment. CAs and their associated RA servers that issue certificates to Key Distribution Hosts or subordinate CAs must additionally meet the following: The physically secure environment must have true floor to ceiling (slab to slab) walls. Alternatively, solid materials, steel mesh or bars may be utilized below floors and above ceilings to protect against intrusions e.g., in a caged environment. This physically secure environment must have a 24/7 intrusion detection system:
83
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
The intrusion detection system must have 24-hour monitoring (including UPS). The intrusion detection system must include the use of motion sensors. The system must be capable of and perform recording and archiving of alarm activity. Alarm activity must include unauthorized entry attempts or any deliberate or inadvertent actions that disable the intrusion detection system. All logged alarm activity information must be reviewed and resolved. One or more cameras must provide continuous (motion activated systems that are separate from eh intrusion detection system may be used) monitoring of entry and exit tot eh physically secure environment. Lighting must exist for the camera images. Recording must be at a minimum of five frames equally every three seconds. Use three layers of physical security exist in the CA facility with increasing levels of access control for each of the following levels: Level One Barrier: This level consists of the entrance to the facility. The building or secure facility entrance will only allow the entrance of authorized personnel to the facility. A guarded entrance or foyer with a receptionist requires the use of a logbook to register authorized visitors (guests) to the facility. Level Two Barrier: This level secures the entrance beyond the foyer / reception area to the CA facility. This entrance must be monitored by a video recording system and require secure entry of authorized personnel only. All entry through this barrier must be logged. Single entry into this barrier is allowed. Authorized visitors must be escorted at all times when within this barrier and beyond. Level Three Barrier: This level provides access to the dedicated room housing the CA and signing engines. This entrance requires dual access. Personnel with access must be divided into an A group and a B group, such that access requires at least one member from each group. The A and B groups should correlate to separate organizational units. Doors must have locks and all authorized personnel having access through this barrier must have successfully completed a background security check and are assigned resources (staff, dedicated personnel) of the CA operator. Other personnel that require entry to this level must be accompanied by two (2) authorized and assigned resources at all times. CA Personnel (authorized individuals with a formal PKI role) entering the physically secure CA environment must sign an access logbook. This log must be maintained within the CA room. This logbook must include: Name and signature of the individual, Participants Organization, Date and time in and out, Reason for visit.
84
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
Visitors (contractors, maintenance personnel, etc.) must also sign an access logbook. In addition to the aforementioned, the logbook for visitor access must include name and signature of the individuals escorting the visitor.
Access to the room creates an audit event, which must be logged. Motion sensors must be in place to activate cameras (if cameras are not recording all activity continually). Invalid access attempts also create audit records, which must be followed up on by security personnel. Automated login and logout enforcement of personnel is required at level three. This level may never be occupied by less than two persons except during the time of login and logout. This period for entrance and egress will not exceed thirty seconds. For time of single occupancy exceeding thirty seconds the system must automatically generate an audit event that must be followed up on by security personnel. ApplicabilityQuestion Scope This question applies to all TRSMs at all sites, including CAs. This question includes test, production, and spare, and old and new devices. This question also includes key loading devices that can encrypt keys and produce cryptograms of those keys. Intent of Question To protect against the ability to misuse a TRSM in a manner that would allow the discovery of known plaintext and the corresponding ciphertext, which could allow the discovery of keys and ultimately the discovery of PINs. To protect against key compromise and key substitution.
Audit Technique Interview appropriate personnel and review documentation of procedures to ensure the adequacy of procedures over equipment that could be used to produce cryptograms of keys under valid production keys. Ensure procedures/policy does not allow HSMs to remain in the authorized state when connected to online production systems. This includes CAs HSMs. Ensure KLDs are not under single control, and that they do not use default passwords. Examine the storage arrangements for all HSM brass keys, passwords, and any devices that are used to enter the component values into the HSM. Verify that no single person has the ability to place the device in a state that would allow key values to be entered. If multiple brass keys are needed to activate the HSM, ensure that these keys are not in the locks and that they have been assigned to separate designated custodians. Inspect the HSMs to ensure that they are in an armed state, that the anti-tamper sensors have been enabled and that the brass keys are not in the locks. Advise that the copies of an individual brass key be separated and stored securely in two different sites. Verify that CA and RA database and application servers and cryptographic devices (TRSMs) reside in a physically secure and monitored environment. Validate that all bullets above that specify the characteristics of the physically secure environment are met (e.g., physically dedicated room, CCTV monitoring, etc.). Verify that CAs and their associated RA servers that issue certificates to Key Distribution Hosts or subordinate CAs also meet the respective bullets stated above (e.g., true floor to ceiling walls, intrusion detection, three layers of physical security, etc.).
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public 85
Verify the existence and use of a CA room log book. Verify all stated requirements for the individual physical access layers are met.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
86
Audit Technique Review existing documentation for completeness. See Question 7 for details.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
87
Question 2a.
PINs processed online are always processed using Triple DES and double- or triple-length keys. Compliant? Yes No N/A
Question 2b.
PINs processed offline using IC Card technology are protected in accordance with the requirements in Book 2 of the EMV IC Card Specifications for Payment Systems. Compliant? Yes No N/A
Question 3.
ISO PIN Block Format 0, 1, or 3 is being used for online interchange transactions. Format 2 must be used for PINs that are submitted from the IC reader to the IC. Compliant? Yes No N/A
Question 4.
PINs are only stored (store and forward) in a compliant manner. Compliant? Yes No N/A
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
88
Question 5.
All keys are generated randomly using a process that is capable of satisfying the statistical tests of NIST SP 800-22. Compliant? Yes No N/A
Question 6.
Any compromise of a key during generation would require collusion. Compliant? Yes No N/A
Question 7.
Written key creation procedures exist and are in use. Compliant? Yes No N/A
Question 8.
Secret or private keys are conveyed as components using different communication channels, or as cryptograms. A mechanism independent of the actual conveyance method that provides the ability to validate the correct key was received is used when conveying public keys. Compliant? Yes No N/A
Question 9.
During key loading or other internal movements, unencrypted key components are in the custody of custodians, in a secure container, or in a TRSM. Compliant? Yes No N/A
Question 10.
All key exchange keys are at least as strong as any key transmitted or conveyed. All DES keys are at least double length keys and RSA keys use a key modulus of at least 1024 bits. Compliant? Yes No N/A
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
89
Question 11.
Written key transfer procedures exist and are in use. Compliant? Yes No N/A
Question 12.
Unencrypted keys are loaded into TRSMs (HSMs and PEDs) under dual control/split knowledge. Compliant? Yes No N/A
Question 13.
Key loading at HSMs or PIN entry devices is protected against external surveillance. Compliant? Yes No N/A
Question 14.
Question 15.
The key-loading process includes procedures to guard against tampering or modification (e.g., testing key check values, hashes, or other similar unique values that are based upon the keys or key components being loaded). Compliant? Yes No N/A
Question 16.
Written key-loading procedures exist and are in use. Compliant? Yes No N/A
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
90
Question 17.
Keys used between pairs of network nodes are unique, except by chance. Compliant? Yes No N/A
Question 18.
Procedures to prevent or detect key substitution are in place. Compliant? Yes No N/A
Question 19.
Cryptographic keys are only used for a single purpose. Compliant? Yes No N/A
Question 20.
All keys in PIN entry devices are unique, except by chance. Compliant? Yes No N/A
Question 21.
Keys exist only as components, as cryptograms, or within TRSMs. Compliant? Yes No N/A
Question 22.
Question 23.
Key variants are not used outside the device that holds the original key. Compliant? Yes No N/A
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
91
Question 24.
Question 25.
Question 26.
Question 27.
Backup copies of keys are stored in a compliant manner. Compliant? Yes No N/A
Question 28.
Written key administration procedures exist and are in use. Compliant? Yes No N/A
Question 29.
PIN-processing equipment (PEDs and HSMs) is inspected before being placed into service and substitution protection exists. Compliant? Yes No N/A
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
92
Question 30.
Keys, PINs and other PIN-related information are removed from devices taken out of service. Compliant? Yes No N/A
Question 31.
All TRSMs are managed under dual control and have adequate physical protection. Compliant? Yes No N/A
Question 32.
Written equipment security procedures exist and are used in equipment commissioning and decommissioning. Compliant? Yes No N/A
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
93
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
Discuss Key-loading proceduresProcedures for ATMs, POS devices, and HSMs will be discussed, including documentation and load logs. Discuss Key Component Transmittal/Receipt ProceduresDescriptions of how key component values are conveyed to and received from other networks will be discussed, as will the processes used to convey key component values to ATM or POS endpoints. Describe PIN BlockThe PIN Block format used to protect interchange PINs will be described in order to verify that it is compliant. Key Component Destruction ProceduresThe methods and documentation involved in the destruction of obsolete key components will be discussed and all logs and affidavits of destruction will be examined. ATM/POS PIN Pad/HSM Install and Decommissioning ProceduresThe steps used to bring endpoint devices and Hardware Security Modules into and out of service are discussed. DocumentationIn addition to documentation for the key life cycle and equipment management procedures described above, writtenas distinct from verbalprocedures in the following areas will be reviewed: a) Equipment commissioning/decommissioning b) Equipment substitution c) Equipment theft d) Key substitution e) Periodic equipment inspections f) Key compromise procedures g) CA certification practice statement
Exit InterviewA discussion of the findings from the Field Review will take place in order to advise management of the variances (if any) that will be documented in the management letter.
PCI Security Program: Auditors Guide 2008 Visa Inc. VISA Public
95