3.2.1: Account data storage kept minimum; policies include secure deletion
3.3.1: SAD not stored after authorization, rendered unrecoverable
3.3.2: SAD stored electronically prior to authorization encrypted
3.4.1: PAN masked when displayed (max BIN + last 4 digits)
3.4.2: Technical controls prevent copying/relocating PAN (remote access)
3.5.1: PAN rendered unreadable (hashing, truncation, tokens, strong cryptography)
3.5.1.1: Hashes of PAN are keyed cryptographic hashes
3.5.1.2: Disk/partition encryption limited (PAN secured via another mechanism)
3.6.1: Procedures define protecting cryptographic keys (access restricted, separation)
3.6.1.2: Secret/private keys stored securely (encrypted/SCD/key shares)
3.7.1: Policies implemented for strong key generation
3.7.2: Policies implemented for secure key distribution
3.7.4: Policies implemented for key rotation/change
3.7.5: Policies implemented for key retirement/destruction/replacement
3.7.6: Manual cleartext operations use split knowledge/dual control
3.7.7: Prevention of unauthorized substitution of cryptographic keys
3.7.8: Key custodians formally acknowledge responsibilities
3.7.9: Guidance provided to customers on secure key management (SP only)