3.1.1 |
All security policies and operational procedures that are identified in Requirement 3 are: - Documented.
- Kept up to date.
- In use.
- Known to all affected parties.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.1.2 |
Roles and responsibilities for performing activities in Requirement 3 are documented, assigned, and
understood.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.2.1 |
Account data storage is kept to a minimum through implementation of data retention and disposal policies,
procedures, and processes that include at least the following: - Coverage for all locations of stored account data.
-
Coverage for any sensitive authentication data (SAD) stored prior to completion of authorization.
This bullet is a best practice until its effective date; refer to Applicability Notes below for
details.
-
Limiting data storage amount and retention time to that which is required for legal or regulatory,
and/or business requirements.
-
Specific retention requirements for stored account data that defines length of retention period
and includes a documented business justification.
-
Processes for secure deletion or rendering account data unrecoverable when no longer needed per
the retention policy.
-
A process for verifying, at least once every three months, that stored account data exceeding the
defined retention period has been securely deleted or rendered unrecoverable.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.3.1 |
SAD is not retained after authorization, even if encrypted. All sensitive authentication data received is
rendered unrecoverable upon completion of the authorization process.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.3.1.1 | The full contents of any track are not retained upon completion of the authorization process. | | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.3.1.2 | The card verification code is not retained upon completion of the authorization process. | | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.3.1.3 |
The personal identification number (PIN) and the PIN block are not stored upon completion of the
authorization process.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.3.2 |
SAD that is stored electronically prior to completion of authorization is encrypted using strong
cryptography.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.3.3 |
Additional requirement for issuers and companies that support issuing services and store sensitive
authentication data: Any storage of sensitive authentication data is:
Limited to that which is needed for a legitimate issuing business need and is secured. Encrypted using
strong cryptography. This bullet is a best practice until its effective date; refer to Applicability Notes
below for details.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.4.1 |
PAN is masked when displayed (the BIN and last four digits are the maximum number of digits to be
displayed), such that only personnel with a legitimate business need can see more than the BIN and last
four digits of the PAN.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.4.2 |
When using remote-access technologies, technical controls prevent copy and/or relocation of PAN for all
personnel, except for those with documented, explicit authorization and a legitimate, defined business
need.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.5.1 |
PAN is rendered unreadable anywhere it is stored by using any of the following approaches: - One-way hashes based on strong cryptography of the entire PAN.
-
Truncation (hashing cannot be used to replace the truncated segment of PAN). - If hashed and
truncated versions of the same PAN, or different truncation formats of the same PAN, are present
in an environment, additional controls are in place such that the different versions cannot be
correlated to reconstruct the original PAN.
- Index tokens.
- Strong cryptography with associated key-management processes and procedures.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.5.1.1 |
Hashes used to render PAN unreadable (per the first bullet of Requirement 3.5.1) are keyed cryptographic
hashes of the entire PAN, with associated key-management processes and procedures in accordance with
Requirements 3.6 and 3.7.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.5.1.2 |
If disk-level or partition-level encryption (rather than file-, column-, or field-level database
encryption) is used to render PAN unreadable, it is implemented only as follows: - On removable electronic media OR
-
If used for non-removable electronic media, PAN is also rendered unreadable via another mechanism
that meets Requirement 3.5.1.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.5.1.3 |
If disk-level or partition-level encryption is used (rather than file-, column-, or field--level database
encryption) to render PAN unreadable, it is managed as follows: -
Logical access is managed separately and independently of native operating system authentication
and access control mechanisms.
- Decryption keys are not associated with user accounts.
-
Authentication factors (passwords, passphrases, or cryptographic keys) that allow access to
unencrypted data are stored securely.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.6.1 |
Procedures are defined and implemented to protect cryptographic keys used to protect stored account data
against disclosure and misuse that include: - Access to keys is restricted to the fewest number of custodians necessary.
- Key-encrypting keys are at least as strong as the data-encrypting keys they protect.
- Key-encrypting keys are stored separately from data-encrypting keys.
- Keys are stored securely in the fewest possible locations and forms.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.6.1.1 |
Additional requirement for service providers only: A documented description of the cryptographic
architecture is maintained that includes: -
Details of all algorithms, protocols, and keys used for the protection of stored account data,
including key strength and expiry date.
-
Preventing the use of the same cryptographic keys in production and test environments. This bullet
is a best practice until its effective date; refer to Applicability Notes below for details.
- Description of the key usage for each key.
-
Inventory of any hardware security modules (HSMs), key management systems (KMS), and other secure
cryptographic devices (SCDs) used for key management, including type and location of devices, as
outlined in Requirement 12.3.4.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.6.1.2 |
Secret and private keys used to encrypt/decrypt stored account data are stored in one (or more) of the
following forms at all times: -
Encrypted with a key-encrypting key that is at least as strong as the data-encrypting key, and
that is stored separately from the data-encrypting key.
-
Within a secure cryptographic device (SCD), such as a hardware security module (HSM) or
PTS-approved point-of-interaction device.
-
As at least two full-length key components or key shares, in accordance with an industry-accepted
method.
| | | | ✅ |
Chargebee does not store Cardholder data (PAN) in entirety (i.e., Chargebee stores only BIN and last four
digits) and hence PCI requirements related to storage of cardholder data are not applicable.
|
3.6.1.3 |
Access to cleartext cryptographic key components is restricted to the fewest number of custodians
necessary.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.6.1.4 | Cryptographic keys are stored in the fewest possible locations. | | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable.
|
3.7.1 |
Key-management policies and procedures are implemented to include generation of strong cryptographic keys
used to protect stored account data.
| | | | ✅ |
Chargebee does not store Cardholder data (PAN) in entirety (i.e., Chargebee stores only BIN and last four
digits) and hence PCI requirements related to storage of cardholder data are not applicable.
|
3.7.2 |
Key-management policies and procedures are implemented to include secure distribution of cryptographic
keys used to protect stored account data.
| | | | ✅ |
Chargebee does not store Cardholder data (PAN) in entirety (i.e., Chargebee stores only BIN and last four
digits) and hence PCI requirements related to storage of cardholder data are not applicable.
|
3.7.3 |
Key-management policies and procedures are implemented to include secure storage of cryptographic keys
used to protect stored account data.
| | | | ✅ |
Chargebee does not store Cardholder data (PAN) in entirety (i.e., Chargebee stores only BIN and last four
digits) and hence PCI requirements related to storage of cardholder data are not applicable.
|
3.7.4 |
Key management policies and procedures are implemented for cryptographic key changes for keys that have
reached the end of their cryptoperiod, as defined by the associated application vendor or key owner, and
based on industry best practices and guidelines, including the following: - A defined cryptoperiod for each key type in use.
- A process for key changes at the end of the defined cryptoperiod.
| | | | ✅ |
Chargebee does not store Cardholder data (PAN) in entirety (i.e., Chargebee stores only BIN and last four
digits) and hence PCI requirements related to storage of cardholder data are not applicable.
|
3.7.5 |
Key management policies procedures are implemented to include the retirement, replacement, or destruction
of keys used to protect stored account data, as deemed necessary when: - The key has reached the end of its defined cryptoperiod.
-
The integrity of the key has been weakened, including when personnel with knowledge of a cleartext
key component leaves the company, or the role for which the key component was known.
-
The key is suspected of or known to be compromised.
Retired or replaced keys are not used
for encryption operations.
| | | | ✅ |
Chargebee does not store Cardholder data(PAN) in entirety (i.e. Chargebee stores only BIN and last four
digits.) and hence PCI requirements related to storage of cardholder data is not applicable
|
3.7.6 |
Where manual cleartext cryptographic key- management operations are performed by personnel, key-management
policies and procedures are implemented include managing these operations using split knowledge and dual
control.
| | | | ✅ |
Chargebee does not store Cardholder data (PAN) in entirety (i.e., Chargebee stores only BIN and last four
digits) and hence PCI requirements related to storage of cardholder data are not applicable.
|
3.7.7 |
Key management policies and procedures are implemented to include the prevention of unauthorized
substitution of cryptographic keys.
| | | | ✅ |
Chargebee does not store Cardholder data (PAN) in entirety (i.e., Chargebee stores only BIN and last four
digits) and hence PCI requirements related to storage of cardholder data are not applicable.
|
3.7.8 |
Key management policies and procedures are implemented to include that cryptographic key custodians
formally acknowledge (in writing or electronically) that they understand and accept their key-custodian
responsibilities.
| | | | ✅ |
Chargebee does not store Cardholder data (PAN) in entirety (i.e., Chargebee stores only BIN and last four
digits) and hence PCI requirements related to storage of cardholder data are not applicable.
|
3.7.9 |
Additional requirement for service providers only: Where a service provider shares cryptographic keys with
its customers for transmission or storage of account data, guidance on secure transmission, storage and
updating of such keys is documented and distributed to the service provider’s customers.
| | | | ✅ |
Chargebee does not store Cardholder data (PAN) in entirety (i.e., Chargebee stores only BIN and last four
digits) and hence PCI requirements related to storage of cardholder data are not applicable.
|