SlideShare a Scribd company logo
1 of 14
Download to read offline
6 FACTS ABOUT
THAT YOU NEED
TO KNOW
P2PE
A security methodology that is designed to encrypt
cardholder data immediately upon capture via chip read,
swipe, tap, or keyed within a secure point-of-interaction.
Data from transactions processed with a PCI-validated P2PE
solution isn’t decipherable to anyone who might steal it
during the transaction process and thus lacks value
for thieves.
Point-to-Point Encryption
What is
P2PE?
Credit Card Number
4123456789012345
Encrypted
Credit Card Number
a!b@c#d$e%f^g&h*
PCI P2PE
Validation
Process
Payment Card Industry (PCI) Security Standards Council (SSC)
Who developed the standards?
What is the standard?
Who validates the solution?
The stringent PCI SSC Point-to-Point Encryption (P2PE) Standard version 2.0 was developed to
establish security standards for payment device chain of custody and payment card data in transit
Independent PCI P2PE Qualified Security Assessor (QSA) and
Payment Card Industry (PCI) Security Standards Council (SSC)
PCI DSS is the basic standard for payment security. 
P2PE is the highest form of payment encryption
security available.
PCI DSS
vs
P2PE
If payment security were cars, PCI DSS would be the basic sedan
and P2PE would be the armored tank.
PCI DSS
The PCI DSS framework is a list of
technical, physical, and process
controls that are required to
address security threats that could
compromise cardholder data within
the merchant environment.
P2PE
Validated P2PE solutions have strict guidelines to
drastically reduce the risk of tampering including special
packaging and tracking the device through a secure chain
of custody throughout shipment, starting from terminal
key injection facility, to the terminal provisioning by the
solution provider, and to the delivery/receiving point of the
device’s end-user organization.
Also referred to as "chain-of-custody",
stringent processes extend to the
integrity of all devices throughout
their life to ensure the device has not
been tampered with.
Device
Integrity
Key Injection
Provisioning Shipping
Arrival at
merchant location
PCI Scope
Reduction
SAQ requirements drop by nearly
90%
SAQ Questions
SAQ D SAQ P2PE
329
33
0
50
100
150
200
250
300
350
# of Questions
P2PE
Transaction
Flow
Payment Device Payment Fusion P2PE Credit Card Networks
Additional resources on P2PE
www.axiamed.com/p2pe
www.axiamed.com/paymentfusionp2pewhitepaper/
www.pcisecuritystandards.org/assessors_and_solutions/point_to_point_encryption_solutions
855.376.2942
info@axiamed.com
www.axiamed.com

More Related Content

What's hot

Experiment
ExperimentExperiment
Experiment
jbashask
 
Pay Forum Conference
Pay Forum ConferencePay Forum Conference
Pay Forum Conference
hagero
 

What's hot (17)

Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Nordea
NordeaNordea
Nordea
 
Open Banking beyond PSD2 in the EU
Open Banking beyond PSD2 in the EU Open Banking beyond PSD2 in the EU
Open Banking beyond PSD2 in the EU
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
 
Experiment
ExperimentExperiment
Experiment
 
Blockchain use cases in health and education
Blockchain use cases in health and educationBlockchain use cases in health and education
Blockchain use cases in health and education
 
Eika
Eika Eika
Eika
 
Pki (2nd e transactions forum) v 1.0
Pki (2nd e transactions forum) v 1.0Pki (2nd e transactions forum) v 1.0
Pki (2nd e transactions forum) v 1.0
 
"Client authentication in e-commerce solutions" by Jānis Kūliņš from Tieto La...
"Client authentication in e-commerce solutions" by Jānis Kūliņš from Tieto La..."Client authentication in e-commerce solutions" by Jānis Kūliņš from Tieto La...
"Client authentication in e-commerce solutions" by Jānis Kūliņš from Tieto La...
 
Coindaq white paper
Coindaq white paperCoindaq white paper
Coindaq white paper
 
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFsBest practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
 
PKI in Korea
PKI in KoreaPKI in Korea
PKI in Korea
 
Danske Bank
Danske BankDanske Bank
Danske Bank
 
Pay Forum Conference
Pay Forum ConferencePay Forum Conference
Pay Forum Conference
 
Who are you? Authentication by certificates
Who are you? Authentication by certificatesWho are you? Authentication by certificates
Who are you? Authentication by certificates
 
Implementing Open Banking with ForgeRock
Implementing Open Banking with ForgeRockImplementing Open Banking with ForgeRock
Implementing Open Banking with ForgeRock
 
UKCCC: Open Banking Introduction
UKCCC: Open Banking IntroductionUKCCC: Open Banking Introduction
UKCCC: Open Banking Introduction
 

Similar to AxiaMed_6 facts about P2PE

Hpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessmentHpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessment
at MicroFocus Italy ❖✔
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment Security
Tom Cooley
 
QRedit Presentation_2016
QRedit Presentation_2016QRedit Presentation_2016
QRedit Presentation_2016
Eddie Cohen
 

Similar to AxiaMed_6 facts about P2PE (20)

P2PE - PCI DSS
P2PE - PCI DSSP2PE - PCI DSS
P2PE - PCI DSS
 
PCI DSS
PCI DSSPCI DSS
PCI DSS
 
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private clouds
 
Point-to-Point Encryption: Best Practices and PCI Compliance Update
Point-to-Point Encryption: Best Practices and PCI Compliance UpdatePoint-to-Point Encryption: Best Practices and PCI Compliance Update
Point-to-Point Encryption: Best Practices and PCI Compliance Update
 
PCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline CompliancePCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline Compliance
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overview
 
Hpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessmentHpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessment
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PE
 
Tokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data StorageTokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data Storage
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
Pcidss qr gv3_1
Pcidss qr gv3_1Pcidss qr gv3_1
Pcidss qr gv3_1
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment Security
 
PCI Compliance (for developers)
PCI Compliance (for developers)PCI Compliance (for developers)
PCI Compliance (for developers)
 
Webinar - PCI PIN, PCI cryptography & key management
Webinar - PCI PIN, PCI cryptography & key managementWebinar - PCI PIN, PCI cryptography & key management
Webinar - PCI PIN, PCI cryptography & key management
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 
PCI DSS for Pentesting
PCI DSS for PentestingPCI DSS for Pentesting
PCI DSS for Pentesting
 
Pymnts BlueFin Webinar
Pymnts BlueFin WebinarPymnts BlueFin Webinar
Pymnts BlueFin Webinar
 
QRedit Presentation_2016
QRedit Presentation_2016QRedit Presentation_2016
QRedit Presentation_2016
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
 

Recently uploaded

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 

Recently uploaded (20)

W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 

AxiaMed_6 facts about P2PE

  • 1. 6 FACTS ABOUT THAT YOU NEED TO KNOW P2PE
  • 2. A security methodology that is designed to encrypt cardholder data immediately upon capture via chip read, swipe, tap, or keyed within a secure point-of-interaction. Data from transactions processed with a PCI-validated P2PE solution isn’t decipherable to anyone who might steal it during the transaction process and thus lacks value for thieves. Point-to-Point Encryption What is P2PE?
  • 5. Payment Card Industry (PCI) Security Standards Council (SSC) Who developed the standards? What is the standard? Who validates the solution? The stringent PCI SSC Point-to-Point Encryption (P2PE) Standard version 2.0 was developed to establish security standards for payment device chain of custody and payment card data in transit Independent PCI P2PE Qualified Security Assessor (QSA) and Payment Card Industry (PCI) Security Standards Council (SSC)
  • 6. PCI DSS is the basic standard for payment security.  P2PE is the highest form of payment encryption security available. PCI DSS vs P2PE If payment security were cars, PCI DSS would be the basic sedan and P2PE would be the armored tank.
  • 7. PCI DSS The PCI DSS framework is a list of technical, physical, and process controls that are required to address security threats that could compromise cardholder data within the merchant environment. P2PE Validated P2PE solutions have strict guidelines to drastically reduce the risk of tampering including special packaging and tracking the device through a secure chain of custody throughout shipment, starting from terminal key injection facility, to the terminal provisioning by the solution provider, and to the delivery/receiving point of the device’s end-user organization.
  • 8. Also referred to as "chain-of-custody", stringent processes extend to the integrity of all devices throughout their life to ensure the device has not been tampered with. Device Integrity
  • 11. SAQ Questions SAQ D SAQ P2PE 329 33 0 50 100 150 200 250 300 350 # of Questions
  • 13. Payment Device Payment Fusion P2PE Credit Card Networks
  • 14. Additional resources on P2PE www.axiamed.com/p2pe www.axiamed.com/paymentfusionp2pewhitepaper/ www.pcisecuritystandards.org/assessors_and_solutions/point_to_point_encryption_solutions 855.376.2942 info@axiamed.com www.axiamed.com