Under PCI DSS, what is true about storing sensitive authentication data after authorization?

Study for the PCI Data Security Standard Exam. Master your knowledge with interactive flashcards and multiple-choice questions, each with hints and explanations. Prepare confidently for your certification test!

Multiple Choice

Under PCI DSS, what is true about storing sensitive authentication data after authorization?

Explanation:
Sensitive authentication data must not be stored after authorization. This includes data like full track or magnetic stripe data, CVV/CVC/CID codes, and PIN blocks. Even if you encrypt it, or have a business justification, or mask it later, PCI DSS requires that you do not retain this data once authorization is complete. If such data has already been captured, it must be discarded or rendered unrecoverable. The goal is to prevent any risk that this highly sensitive data could be misused if compromised. In practice, you may retain non-sensitive identifiers (for example, a tokenized reference or masked account number) but not the actual authentication data itself after authorization.

Sensitive authentication data must not be stored after authorization. This includes data like full track or magnetic stripe data, CVV/CVC/CID codes, and PIN blocks. Even if you encrypt it, or have a business justification, or mask it later, PCI DSS requires that you do not retain this data once authorization is complete. If such data has already been captured, it must be discarded or rendered unrecoverable. The goal is to prevent any risk that this highly sensitive data could be misused if compromised. In practice, you may retain non-sensitive identifiers (for example, a tokenized reference or masked account number) but not the actual authentication data itself after authorization.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy