Sensitive authentication data may be transmitted or processed as part of a payment transaction, but what is the key storage rule?

Boost your readiness for the PCI DSS Requirements Exam with engaging flashcards and comprehensive multiple choice questions. Each comes with hints and explanations to maximize your understanding!

Multiple Choice

Sensitive authentication data may be transmitted or processed as part of a payment transaction, but what is the key storage rule?

Explanation:
The key rule here is that sensitive authentication data cannot be stored. You may transmit or process it as needed to complete a payment, but you must discard it after authorization and refrain from saving it anywhere in your systems. This protects against reuse of data like full track data, CVV/CVV2, PIN blocks, or other SAD if a breach occurs. Encrypting the data or handling it during the transaction does not override this prohibition—storage of SAD is not allowed, even in encrypted form. Only non-sensitive data or tokenized form should be retained for any future use.

The key rule here is that sensitive authentication data cannot be stored. You may transmit or process it as needed to complete a payment, but you must discard it after authorization and refrain from saving it anywhere in your systems. This protects against reuse of data like full track data, CVV/CVV2, PIN blocks, or other SAD if a breach occurs. Encrypting the data or handling it during the transaction does not override this prohibition—storage of SAD is not allowed, even in encrypted form. Only non-sensitive data or tokenized form should be retained for any future use.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy