Can I Store Cardholder Data?

Alastair Stewart
|
Senior Consultant at URM
|
PUBLISHED on
5 Aug
2022

Table of Contents

In this article, we aim to clarify what requirements the Payment Card Industry Data Security Standard (PCI DSS) places around the protection of cardholder data (CHD) and, in particular, sensitive authentication data (SAD).

But first, a bit of a recap.  The PCI DSS is an information security standard for organisations that store, process and/or transmit payment card data.  In 2004, 5 major card brands (Visa, MasterCard, JCB, American Express and Discover*) joined forces to form the Payment Card Industry Security Standards Council (PCI SSC) and produced PCI DSS version 1 to help businesses process card payments securely and reduce card fraud.  Since that time there have been various iterations of the Standard with the latest version (4.0) being released on31 March 2022 providing a set of baseline controls that is expected to be complied with by all organisations processing payment card data.  .

When we refer to payment card data, however, a distinction is made between the storing, processing or transmitting of cardholder data (CHD) and sensitive authentication data (SAD).  Here, we look at the differences and the extra PCI DSS requirements which apply to SAD.

*In 2020, UnionPay joined the founding 5 brands as a strategic partner on the Payment Card Industry Security Standards Council (PCI SSC)

CHD vs. SAD

The PCI DSS considers CHD and SAD as account data.  CHD consists of a full primary account number (PAN) plus any of the following: cardholder name, expiration date and service code.  It is worth noting that storage requirements of the PCI DSS apply to the PAN and the other data if it is stored in conjunction with the PAN.  If you only store the other data without the PAN, then the storage requirements do not apply

SAD consists of the track data in the magnetic strip, the PIN and PIN block data stored in the chip and the verification code.  Due to the different card brand naming conventions, the verification code is variously referred to as ‘card verification value’ (CVV2), ‘card authentication value’ (CAV2), ‘card verification code’ (CVC2) and ‘card identification number (CID).  Visa uses the term CVV2, JCB uses CAV2, MasterCard uses CVC2 and American Express and Discovery both use CID.

For Discover, JCB, MasterCard and Visa payment cards, card verification values or codes are the rightmost 3-digit value printed in the signature panel on the reverse of the card.  For American Express payment cards, the code is a 3-digit, unembossed number printed above the PAN on the face of the payment cards.  The code is uniquely associated with each individual card and ties the PAN to the card.

With SAD, the PCI DSS places extra security requirements.  Most significantly, unless issuers or issuing organisations have a legitimate business need to store the authentication data, SAD must never be stored after authorisation, even if encrypted.  This applies even where there is no PAN in the environment.  Organisations should also contact their acquirer or the individual payment brands directly to understand whether SAD is permitted to be stored prior to authorisation, for how long, and any related usage and protection requirements.

Alastair Stewart
Senior Consultant at URM
Alastair is one of the most experienced and proficient Payment Card Industry Qualified Security Assessors (PCI QSAs) in the UK. He has completed in excess of one hundred successful reports on compliance (RoCs) against different PCI DSS versions along with supporting the completion of self-assessment questionnaires (SAQs).
Read more

Are you looking for help preparing for a PCI DSS assessment?

As a PCI QSA, URM can assist you with a range of services, including conducting gap analyses, helping you reduce your CDE scope and conducting penetration tests.
Thumbnail of the Blog Illustration
Information Security
Published on
14/3/2023
Preparing For a PCI DSS v4.0 Assessment

URM is sharing its experiences on how the changes to the PCI DSS v4 affect the assessment process and how organisations can best prepare for the differences.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
8/8/2022
Top 5 common pitfalls of PCI DSS compliance

As a Payment Card Industry Qualified Security Assessor (PCI QSA) company, we are often asked by organisations which process card payments....

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
15/2/2023
PCI DSS v4.0 and Multi-Factor Authentication

After the recent changes to PCI DSS v4.0 we're examining factors behind the greater utilisation of MFA, and what the key changes are in requirements.

Read more
URM's diligence during these audits has resulted in the business as a whole pulling together to collectively ensure that we up to par with the requirements. While our working relationship with URM’s consultant is fantastic, we are held to account for every bullet point of every requirement on every audit, which is precisely what we expect. The consultant’s efforts in ensuring that our PCI compliance is audited correctly is highly appreciated, as it gives the company an accreditation that we can be proud of and that we can show off to existing and prospective customers as proof of our security posture. A huge thank you to URM for providing such a valuable service.
Open Banking Platform
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.