Point-to-Point Encryption (P2PE)
Encrypt account data within an approved cryptographic device and take the merchant almost completely out of scope for PCI DSS
Point-to-Point Encryption (P2PE) is a special case of application-level encryption, where encryption is applied selectively within a business application—in this case a retail point-of-sale (POS) terminal. If the point-to-point encryption process is implemented correctly, with account data being encrypted within an approved, secure cryptographic device (SCD) such as a POS terminal, and not decrypted at all within the merchant environment, there is potential for the merchant to be taken almost completely out of scope for PCI DSS. Strict controls for protection of and access to decryption keys must be in place; in fact, the current guidance from the PCI Security Standards Council requires the use of hardware security modules (HSMs) with an appropriate security rating to protect access to those keys. Acquirers and other players in the payments chain have already begun to market value-added services that exploit P2PE to reduce compliance costs for their merchants. From a PCI DSS perspective, any system that has the capacity to decrypt account data comes into scope immediately, so the ability to insulate merchants by protecting keys within HSMs can have significant benefits for all concerned.
- Organizations that do not protect account data will fail to comply with PCI DSS mandates, risking fines and damage to the business.
- Attackers can steal customer account data from many places within a typical organization since it can enter intentionally or unintentionally through numerous channels (web sites, call centers and helpdesks, email systems, etc.) and it can rapidly and widely propagate throughout the organization, driving up costs of countermeasures and compliance reporting.
- Encryption can reduce the risks but organizations must take steps to manage keys appropriately. Keys that exist in purely software-based systems are vulnerable to attack and often fall short of compliance obligations.
- While PCI DSS has not mandated the use of point-to-point encryption (P2PE), organizations that do not take advantage of this point-to-point encryption approach to reduce their PCI DSS scope can incur unnecessary compliance costs.
Point-to-Point Encryption: Entrust nShield HSMs
Entrust nShield® HSMs can not only help you implement measures to become PCI DSS compliant effectively and efficiently, but they can also play an essential role in a point-to-point encryption (P2PE) strategy to reduce the scope and therefore the cost of compliance. Entrust nShield HSMs are independently certified to the FIPS 140-2 level 3 standard that is mandated by the P2PE guidelines. Entrust nShield HSMs create a trusted environment in which key material can be safely generated, stored and managed, and where decryption operations can be performed securely. The use of HSMs in this way is directly analogous to the way HSMs are used to protect user PINs as they pass through the payments network. In both cases HSMs overcome the inherent weaknesses of purely software-based systems that could expose cryptographic keys and processes to memory scanning attacks, runtime monitoring or malicious privileged users.
Whether you choose to encrypt and decrypt account data using your own in-house developed software or using third-party commercial applications, Entrust nShield HSMs are easy to deploy and can support innovative technologies such as format preserving encryption (FPE) to minimize impact on existing business processes. These devices are already certified to integrate directly with products from our industry partners and leading POS manufacturers, assuring you of fast deployments and seamless integration with your existing systems.
By using Entrust nShield HSMs you can:
- Deploy PCI DSS compliant point-to-point Encryption (P2PE) to protect account data and reduce compliance costs.
- Accelerate implementation projects; Entrust nShield HSMs are pre-qualified to integrate with products from leading encryption vendors.
- Take advantage of a choice of performance levels and form factors—deploy exactly what you need and only what you need, and upgrade easily as your needs change.
- Take advantage of leading edge FPE to minimize the impact on existing systems that are now exposed to encrypted rather than plain text account data.