Token Service Provider (TSP)
An Introduction to Certification
Biju John, PCI QSA, PA-QSA, PCI P2PE, PCI PA-QSA(P2PE), P2PE, 3DS
VP ControlCase
Agenda
1
 What is Tokenization?
 What is a Token Service Provider or TSP?
 Who can become a TSP
 Benefits of being TSP
 Business Flow for Payment tokens
 Scope – Token Data Environment
 TSP Requirements
 Assessment and Certification
2
The process of replacing sensitive data (Card Data) with
surrogate values that remove risk but preserve value to the
business.
What is Tokenization
 The tokenization is an added layer of protection in
payment processing ecosystem
 Minimize the fraud exposure of data compromise
 No changes to existing payment ecosystem
3
Different type of Tokens
 Acquiring Tokens
Acquiring tokens are created by the acquirer, merchant, or a merchant’s service provider
after the cardholder presents their PAN and/or other payment credentials. It is not based
on an industry-standard and cannot be used for new authorizations.
 Issuer Tokens
Issuer tokens, also known as virtual card numbers, are created by issuers and provide the
means to reduce risk in specific use cases, including commercial card applications, as
well as consumer-oriented services.
 Payment Tokens
Payment tokens are created by TSPs that are registered with EMVCo. Payment Tokens
are issued to a cardholder in lieu of a PAN, and the cardholder presents the Payment
Token to the merchant when making a purchase. During a Payment Token transaction, the
merchant and acquirer do not receive or have access to the corresponding PAN.
4
Sample Payment Token
6203011150123456789
▪ 620301 - BIN
▪ 11 - Card identifier
▪ 5 - Token identifier (0 - production physical card identifier; 99 - test
physical card identifier)
▪ 012345678 - random numbers
▪ 9 - Luhn digit
Complies with PAN format supporting interoperability
within the existing payment processes
 13 – 19 Digits
 Supports ISO 8583 message format
5
Any Service provider within the payments ecosystem that
is able to provide token requestors for ‘Card Data’ with
‘Surrogate' PAN values…
What is a Token Service Provider or TSP?
 Generates and Manages Payment Token
 A wholly independent party from the payment network
or payment processor.
 Can be integrated with a payment network or payment
processor.
6
Token Payment Flow – High-level
7
Sample Steps - Registration
8
Who can become a TSP?
 Generate and issue EMV ‘Payment Tokens’
 Must be a valid PCI DSS certified entity
 Must have registered with EMVCo as Token Service
Provider
Any Service provider within the payments ecosystem such
as Issuers, Acquirers and Merchants that wish to offer
mobile and/or digital payments to customers can become
a TSP.
9
Enables them to reduce long term costs, maintain
independence and increase flexibility to establish an edge
over their competitors.
Benefits of being a TSP – Self Assist
 Provides full control over the tokenization process: creation, storage, issuance
and management
 Full control of digital payments by issuing tokens directly without third party
intervention.
 Reduce long term costs: no additional TSP fees from the payment schemes.
 Save on transaction fees On-us transactions when you are the issuing as well
as the acquiring bank.
 Banks retain their privacy because data and roadmaps do not have to be
shared with the schemes.
 Keep track of customer payment behavior to gain valuable insight and be able
to offer personalized services.
10
Comply with set of controls defined based on EMVCo
Payment Tokenization Specification Technical
Framework and are additional to those in PCI DSS.
How to become a TSP
 Defined as physical and logical security requirements
and assessment procedures
 Requirements developed by PCI SSC and managed by
Payment brands
 Any queries about validating compliance should be
directed to the appropriate Payment Brand(s)
 Not listed by PCI SSC
11
Scope: Token Data Environment (TDE)
The TDE is a dedicated, secure area within the TSP, where
one or more of the following services are performed:
❑Token generation, issuing, and mapping processes (Eg: Token vault)
❑Assignment of token usage parameters (Eg: APIs)
❑Token lifecycle management (Eg: Token vault)
❑Processes to map or re-map tokens, or perform de-tokenization (Eg:
Token vault)
❑Cryptographic processes to support tokenization functions (Eg: HSM)
❑Maintenance of underlying token security and related processing
controls, such as domain restrictions during transaction processing.
12
Token Data Environment (TDE)
Example of TDE Implementation
TDE as a subnet of CDE
Combined CDE and TDE
13
TSP Requirements
 8 Requirements spread across 12 PCI DSS Requirements
 These are in addition to PCI Requirements
❑TSP 1 – Document and validate PCI DSS scope
❑TSP 2 – Secure TDE Systems and Network
❑TSP 3 – Protect and manage cryptographic keys
❑TSP 4 – Restrict access to TDE by business need to know
❑TSP 5 – Identify and authenticate all access to TDE systems
❑TSP 6 – Restrict physical access to the TDE
❑TSP 7 – Monitor all access to TDE
❑TSP 8 – Maintain an Information Security Policy
14
TSP – PCI Mapping
PCI DSS Requirement Additional Applicability for TSPs
1. Install and maintain a firewall configurationto
protect cardholder data
▪ Firewall controls in PCI DSS Requirement 1 also apply to internal firewalls usedto separate TDE
from non-TDE networks.
▪ The current network and data flow diagrams (PCI DSS Requirements 11.2 and 1.1.3) must also
include all connections between the TDE and other networks,and all flows of Payment Tokens
across systems and networks in the TDE.
2. Do not use vendor-supplied defaults forsystem
passwords and other security parameters
▪ PCI DSS Requirement 2 applies to all system components in the TDE.
▪ Wireless environments are not permitted to be connected to the TDE.
3. Protect stored cardholder data ▪ Data retention and disposal policies, procedures and processes (PCI DSS Requirement
3.1) also apply to Payment Token Data.
▪ Payment Tokens must also be masked when displayed such that only personnel with a
legitimate business need can see the full Payment Token (PCI DSS Requirement 3.3), and
rendered unreadable wherever they are stored (PCI DSS Requirement 3.4) in the TDE.
▪ The key-management requirements in this document are in addition to thosein PCI DSS
Requirements 3.5 – 3.6
15
TSP – PCI Mapping
PCI DSS Requirement Additional Applicability for TSPs
4. Encrypt transmission of cardholder data across open,
public networks
▪ Wireless environments are not permitted to be connected to the TDE.
5. Protect all systems against malware and regularly update
anti-virus software or programs
▪ PCI DSS Requirement 5 applies to all system components in the TDE.
6. Develop and maintain secure systems and
applications
▪ PCI DSS Requirement 6 applies to all system components in the TDE.
▪ All changes made to system components in the TDE must be in accordancewith PCI DSS
Requirement 6.4.5.
7. Restrict access to cardholder data bybusiness need to
know
▪ Access to Payment Token Data in the TDE must also be restricted according to principles of need-
to-know and least privilege.
8. Identify and authenticate access to system
components
▪ Strong authentication controls are required for all accounts used to access Payment Tokens
or to access systems in the TDE.
9. Restrict physical access to cardholder data ▪ Physical security controls also apply to secure access to Payment Token Datain the TDE.
10. Track and monitor all access to network resources and
cardholder data
▪ Audit log requirements include all individual user access to Payment Token Datain the TDE (PCI DSS
Requirement 10.2.1).
11. Regularly test security systems and processes ▪ Internal vulnerability scans, penetration tests (for example, to verifysegmentation controls),
intrusion detection, and change detection apply to the TDE.
12. Maintain a policy that addresses information security for all
personnel
▪ PCI DSS Requirement 12 also applies to personnel with access to the TDE.
TSP PCI
TSP1 Scope
TSP2 1, 2
TSP3 3
TSP4 7
TSP5 8
TSP6 9
TSP7 10
TSP8 12
16
TSP – Encryption
 All Key-management process must be conducted within
HSM which is FIPS 140-2 Level 3 certified or PCI PTS
HSM approved
 Approved algorithms
17
Assessment and Certification
 Assessment must be performed by P2PE QSA
 TDE must be PCI DSS certified
▪ PCI DSS requirements not applied may be assessed along with
TSP engagement and issue a partial ROC
 All applicable TSP controls must be applied to TDE
▪ Compensating controls can be considered if necessary
 TSP ROC or T-ROC must be completed as per
Reporting Template for PCI DSS v3
 Submit T-ROC and T-AOC to brands
▪ Client may do it directly with applicable payment brand
18
Why ControlCase?
 Global Reach
▪ Serving more than 400 clients in 40 countries and rapidly growing
 Certified Resources
▪ PCI DSS Qualified Security Assessor (QSA)
▪ PA DSS (PA DSS)
▪ QSA for Point-to-Point Encryption (QSA P2PE)
▪ QSA for TSP
▪ QSA for 3DS
▪ Certified ASV vendor
www.controlcase.com
+ +1.703.483.6383 (US)
+91.9820293399 (India)
sales@controlcase.com
19
To Learn More About PCI TSP Compliance
Discussion forum
20
QA
Thank You for Your Time
21

More Related Content

PPTX
PCI DSS Compliance Checklist
PPTX
PCI DSS and PA DSS Compliance
PPTX
PCI PIN Security & Key Management Compliance
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
PCI DSS Business as Usual
PPTX
Vendor Management for PCI DSS, HIPAA, and FFIEC
PPTX
PCI DSS and Other Related Updates
PPTX
Log Monitoring and File Integrity Monitoring
PCI DSS Compliance Checklist
PCI DSS and PA DSS Compliance
PCI PIN Security & Key Management Compliance
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PCI DSS Business as Usual
Vendor Management for PCI DSS, HIPAA, and FFIEC
PCI DSS and Other Related Updates
Log Monitoring and File Integrity Monitoring

What's hot (20)

PPTX
Vendor risk management webinar 10022019 v1
PPTX
SOC 2 Compliance and Certification
PPTX
Continuous Compliance Monitoring
PPTX
Integrated Compliance
PPTX
Performing One Audit Using Zero Trust Principles
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
Performing PCI DSS Assessments Using Zero Trust Principles
PPTX
PCI DSSand PA DSS
DOCX
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PPTX
PCI DSS 3.2
PPTX
Integrated Compliance
PPTX
Continuous Compliance Monitoring
PPTX
PCI DSS 3.2 - Business as Usual
DOCX
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PPTX
PCI DSS and PA DSS
PPTX
General Data Protection Regulation (GDPR)
PPTX
PCI DSS Business as Usual (BAU)
PPTX
PCI DSS Business as Usual (BAU)
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
OneAudit™ - Assess Once, Certify to Many
Vendor risk management webinar 10022019 v1
SOC 2 Compliance and Certification
Continuous Compliance Monitoring
Integrated Compliance
Performing One Audit Using Zero Trust Principles
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Performing PCI DSS Assessments Using Zero Trust Principles
PCI DSSand PA DSS
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS 3.2
Integrated Compliance
Continuous Compliance Monitoring
PCI DSS 3.2 - Business as Usual
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS and PA DSS
General Data Protection Regulation (GDPR)
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
OneAudit™ - Assess Once, Certify to Many
Ad

Similar to Introduction to Token Service Provider (TSP) Certification (20)

PPTX
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PDF
Pci ssc quick reference guide
PDF
Enterprise Data Protection - Understanding Your Options and Strategies
PDF
Pcidss qr gv3_1
PPTX
PCI Descoping: How to Reduce Controls and Streamline Compliance
PDF
Quick Reference Guide to the PCI Data Security Standard
PPTX
PCI DSS Compliance Readiness
PDF
What is a Token Service Provider?
PDF
a Guide for quick pci dss and payment security
PDF
Point-to-Point Encryption: Best Practices and PCI Compliance Update
PPTX
Payment card industry standrad 12 requiremnets.pptx
PPTX
The Easy WAy to Accept & Protect Credit Card Data
PDF
Tokenization: What's Next After PCI?
 
PDF
Pci dss intro v2
PPTX
PCI DSS 4.0 Webinar Final.pptx
PDF
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
PPTX
PCI-DSS COMPLIANCE ON THE CLOUD
PPTX
PCI DSS v 3.0 and Oracle Security Mapping
PDF
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
PDF
Pci dss v3-2-1
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
Pci ssc quick reference guide
Enterprise Data Protection - Understanding Your Options and Strategies
Pcidss qr gv3_1
PCI Descoping: How to Reduce Controls and Streamline Compliance
Quick Reference Guide to the PCI Data Security Standard
PCI DSS Compliance Readiness
What is a Token Service Provider?
a Guide for quick pci dss and payment security
Point-to-Point Encryption: Best Practices and PCI Compliance Update
Payment card industry standrad 12 requiremnets.pptx
The Easy WAy to Accept & Protect Credit Card Data
Tokenization: What's Next After PCI?
 
Pci dss intro v2
PCI DSS 4.0 Webinar Final.pptx
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
PCI-DSS COMPLIANCE ON THE CLOUD
PCI DSS v 3.0 and Oracle Security Mapping
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
Pci dss v3-2-1
Ad

More from ControlCase (20)

PDF
Logging and Automated Alerting Webinar.pdf
PDF
Navigating Compliance for MSPs From First Audit to Monetization
PDF
Principes de base des tests d’intrusion Webinar
PDF
Penetration Testing Basics Webinar ControlCase
PDF
PCI PIN Basics Webinar from the Controlcase Team
PDF
Maintaining Data Privacy with Ashish Kirtikar
PDF
PCI DSS v4 - ControlCase Update Webinar Final.pdf
PDF
ISO 27001 2002 Update Webinar.pdf
PPTX
Integrated Compliance Webinar.pptx
PDF
2022-Q2-Webinar-ISO_Spanish_Final.pdf
PDF
French PCI DSS v4.0 Webinaire.pdf
PDF
DFARS CMMC SPRS NIST 800-171 Explainer.pdf
PPTX
Webinar-MSP+ Cyber Insurance Fina.pptx
PDF
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
PDF
Webinar-Spanish-PCI DSS-4.0.pdf
PDF
2022 Webinar - ISO 27001 Certification.pdf
PPTX
Webinar - CMMC Certification.pptx
PPTX
HITRUST Certification
PPTX
CMMC Certification
PPTX
FedRAMP Certification & FedRAMP Marketplace
Logging and Automated Alerting Webinar.pdf
Navigating Compliance for MSPs From First Audit to Monetization
Principes de base des tests d’intrusion Webinar
Penetration Testing Basics Webinar ControlCase
PCI PIN Basics Webinar from the Controlcase Team
Maintaining Data Privacy with Ashish Kirtikar
PCI DSS v4 - ControlCase Update Webinar Final.pdf
ISO 27001 2002 Update Webinar.pdf
Integrated Compliance Webinar.pptx
2022-Q2-Webinar-ISO_Spanish_Final.pdf
French PCI DSS v4.0 Webinaire.pdf
DFARS CMMC SPRS NIST 800-171 Explainer.pdf
Webinar-MSP+ Cyber Insurance Fina.pptx
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
Webinar-Spanish-PCI DSS-4.0.pdf
2022 Webinar - ISO 27001 Certification.pdf
Webinar - CMMC Certification.pptx
HITRUST Certification
CMMC Certification
FedRAMP Certification & FedRAMP Marketplace

Recently uploaded (20)

PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Chapter 5: Probability Theory and Statistics
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Modernising the Digital Integration Hub
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Five Habits of High-Impact Board Members
PDF
Architecture types and enterprise applications.pdf
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
CloudStack 4.21: First Look Webinar slides
PDF
STKI Israel Market Study 2025 version august
Enhancing emotion recognition model for a student engagement use case through...
The influence of sentiment analysis in enhancing early warning system model f...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Chapter 5: Probability Theory and Statistics
A comparative study of natural language inference in Swahili using monolingua...
Final SEM Unit 1 for mit wpu at pune .pptx
Modernising the Digital Integration Hub
A proposed approach for plagiarism detection in Myanmar Unicode text
Abstractive summarization using multilingual text-to-text transfer transforme...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
1 - Historical Antecedents, Social Consideration.pdf
Five Habits of High-Impact Board Members
Architecture types and enterprise applications.pdf
2018-HIPAA-Renewal-Training for executives
NewMind AI Weekly Chronicles – August ’25 Week III
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
OpenACC and Open Hackathons Monthly Highlights July 2025
CloudStack 4.21: First Look Webinar slides
STKI Israel Market Study 2025 version august

Introduction to Token Service Provider (TSP) Certification

  • 1. Token Service Provider (TSP) An Introduction to Certification Biju John, PCI QSA, PA-QSA, PCI P2PE, PCI PA-QSA(P2PE), P2PE, 3DS VP ControlCase
  • 2. Agenda 1  What is Tokenization?  What is a Token Service Provider or TSP?  Who can become a TSP  Benefits of being TSP  Business Flow for Payment tokens  Scope – Token Data Environment  TSP Requirements  Assessment and Certification
  • 3. 2 The process of replacing sensitive data (Card Data) with surrogate values that remove risk but preserve value to the business. What is Tokenization  The tokenization is an added layer of protection in payment processing ecosystem  Minimize the fraud exposure of data compromise  No changes to existing payment ecosystem
  • 4. 3 Different type of Tokens  Acquiring Tokens Acquiring tokens are created by the acquirer, merchant, or a merchant’s service provider after the cardholder presents their PAN and/or other payment credentials. It is not based on an industry-standard and cannot be used for new authorizations.  Issuer Tokens Issuer tokens, also known as virtual card numbers, are created by issuers and provide the means to reduce risk in specific use cases, including commercial card applications, as well as consumer-oriented services.  Payment Tokens Payment tokens are created by TSPs that are registered with EMVCo. Payment Tokens are issued to a cardholder in lieu of a PAN, and the cardholder presents the Payment Token to the merchant when making a purchase. During a Payment Token transaction, the merchant and acquirer do not receive or have access to the corresponding PAN.
  • 5. 4 Sample Payment Token 6203011150123456789 ▪ 620301 - BIN ▪ 11 - Card identifier ▪ 5 - Token identifier (0 - production physical card identifier; 99 - test physical card identifier) ▪ 012345678 - random numbers ▪ 9 - Luhn digit Complies with PAN format supporting interoperability within the existing payment processes  13 – 19 Digits  Supports ISO 8583 message format
  • 6. 5 Any Service provider within the payments ecosystem that is able to provide token requestors for ‘Card Data’ with ‘Surrogate' PAN values… What is a Token Service Provider or TSP?  Generates and Manages Payment Token  A wholly independent party from the payment network or payment processor.  Can be integrated with a payment network or payment processor.
  • 7. 6 Token Payment Flow – High-level
  • 8. 7 Sample Steps - Registration
  • 9. 8 Who can become a TSP?  Generate and issue EMV ‘Payment Tokens’  Must be a valid PCI DSS certified entity  Must have registered with EMVCo as Token Service Provider Any Service provider within the payments ecosystem such as Issuers, Acquirers and Merchants that wish to offer mobile and/or digital payments to customers can become a TSP.
  • 10. 9 Enables them to reduce long term costs, maintain independence and increase flexibility to establish an edge over their competitors. Benefits of being a TSP – Self Assist  Provides full control over the tokenization process: creation, storage, issuance and management  Full control of digital payments by issuing tokens directly without third party intervention.  Reduce long term costs: no additional TSP fees from the payment schemes.  Save on transaction fees On-us transactions when you are the issuing as well as the acquiring bank.  Banks retain their privacy because data and roadmaps do not have to be shared with the schemes.  Keep track of customer payment behavior to gain valuable insight and be able to offer personalized services.
  • 11. 10 Comply with set of controls defined based on EMVCo Payment Tokenization Specification Technical Framework and are additional to those in PCI DSS. How to become a TSP  Defined as physical and logical security requirements and assessment procedures  Requirements developed by PCI SSC and managed by Payment brands  Any queries about validating compliance should be directed to the appropriate Payment Brand(s)  Not listed by PCI SSC
  • 12. 11 Scope: Token Data Environment (TDE) The TDE is a dedicated, secure area within the TSP, where one or more of the following services are performed: ❑Token generation, issuing, and mapping processes (Eg: Token vault) ❑Assignment of token usage parameters (Eg: APIs) ❑Token lifecycle management (Eg: Token vault) ❑Processes to map or re-map tokens, or perform de-tokenization (Eg: Token vault) ❑Cryptographic processes to support tokenization functions (Eg: HSM) ❑Maintenance of underlying token security and related processing controls, such as domain restrictions during transaction processing.
  • 13. 12 Token Data Environment (TDE) Example of TDE Implementation TDE as a subnet of CDE Combined CDE and TDE
  • 14. 13 TSP Requirements  8 Requirements spread across 12 PCI DSS Requirements  These are in addition to PCI Requirements ❑TSP 1 – Document and validate PCI DSS scope ❑TSP 2 – Secure TDE Systems and Network ❑TSP 3 – Protect and manage cryptographic keys ❑TSP 4 – Restrict access to TDE by business need to know ❑TSP 5 – Identify and authenticate all access to TDE systems ❑TSP 6 – Restrict physical access to the TDE ❑TSP 7 – Monitor all access to TDE ❑TSP 8 – Maintain an Information Security Policy
  • 15. 14 TSP – PCI Mapping PCI DSS Requirement Additional Applicability for TSPs 1. Install and maintain a firewall configurationto protect cardholder data ▪ Firewall controls in PCI DSS Requirement 1 also apply to internal firewalls usedto separate TDE from non-TDE networks. ▪ The current network and data flow diagrams (PCI DSS Requirements 11.2 and 1.1.3) must also include all connections between the TDE and other networks,and all flows of Payment Tokens across systems and networks in the TDE. 2. Do not use vendor-supplied defaults forsystem passwords and other security parameters ▪ PCI DSS Requirement 2 applies to all system components in the TDE. ▪ Wireless environments are not permitted to be connected to the TDE. 3. Protect stored cardholder data ▪ Data retention and disposal policies, procedures and processes (PCI DSS Requirement 3.1) also apply to Payment Token Data. ▪ Payment Tokens must also be masked when displayed such that only personnel with a legitimate business need can see the full Payment Token (PCI DSS Requirement 3.3), and rendered unreadable wherever they are stored (PCI DSS Requirement 3.4) in the TDE. ▪ The key-management requirements in this document are in addition to thosein PCI DSS Requirements 3.5 – 3.6
  • 16. 15 TSP – PCI Mapping PCI DSS Requirement Additional Applicability for TSPs 4. Encrypt transmission of cardholder data across open, public networks ▪ Wireless environments are not permitted to be connected to the TDE. 5. Protect all systems against malware and regularly update anti-virus software or programs ▪ PCI DSS Requirement 5 applies to all system components in the TDE. 6. Develop and maintain secure systems and applications ▪ PCI DSS Requirement 6 applies to all system components in the TDE. ▪ All changes made to system components in the TDE must be in accordancewith PCI DSS Requirement 6.4.5. 7. Restrict access to cardholder data bybusiness need to know ▪ Access to Payment Token Data in the TDE must also be restricted according to principles of need- to-know and least privilege. 8. Identify and authenticate access to system components ▪ Strong authentication controls are required for all accounts used to access Payment Tokens or to access systems in the TDE. 9. Restrict physical access to cardholder data ▪ Physical security controls also apply to secure access to Payment Token Datain the TDE. 10. Track and monitor all access to network resources and cardholder data ▪ Audit log requirements include all individual user access to Payment Token Datain the TDE (PCI DSS Requirement 10.2.1). 11. Regularly test security systems and processes ▪ Internal vulnerability scans, penetration tests (for example, to verifysegmentation controls), intrusion detection, and change detection apply to the TDE. 12. Maintain a policy that addresses information security for all personnel ▪ PCI DSS Requirement 12 also applies to personnel with access to the TDE. TSP PCI TSP1 Scope TSP2 1, 2 TSP3 3 TSP4 7 TSP5 8 TSP6 9 TSP7 10 TSP8 12
  • 17. 16 TSP – Encryption  All Key-management process must be conducted within HSM which is FIPS 140-2 Level 3 certified or PCI PTS HSM approved  Approved algorithms
  • 18. 17 Assessment and Certification  Assessment must be performed by P2PE QSA  TDE must be PCI DSS certified ▪ PCI DSS requirements not applied may be assessed along with TSP engagement and issue a partial ROC  All applicable TSP controls must be applied to TDE ▪ Compensating controls can be considered if necessary  TSP ROC or T-ROC must be completed as per Reporting Template for PCI DSS v3  Submit T-ROC and T-AOC to brands ▪ Client may do it directly with applicable payment brand
  • 19. 18 Why ControlCase?  Global Reach ▪ Serving more than 400 clients in 40 countries and rapidly growing  Certified Resources ▪ PCI DSS Qualified Security Assessor (QSA) ▪ PA DSS (PA DSS) ▪ QSA for Point-to-Point Encryption (QSA P2PE) ▪ QSA for TSP ▪ QSA for 3DS ▪ Certified ASV vendor
  • 20. www.controlcase.com + +1.703.483.6383 (US) +91.9820293399 (India) sales@controlcase.com 19 To Learn More About PCI TSP Compliance
  • 22. Thank You for Your Time 21