PCI DSS Compliance For DataPower
PCI DSS Compliance For DataPower
Priyanka Kohli
Product Manager – DataPower Gateways
Aug 2021
PCI DSS is applicable for any industry that stores, processes, uses, or
transmits cardholder data and/or sensitive authentication data. The
objective of PCI DSS is to protect the cardholder’s data and sensitive
authentication data against any unauthorized access, use, disclosure,
disruption, or modification. The cardholder data includes primary account
number, cardholder name, expiration date, and service code, whereas the
Sensitive authentication data includes Full track data (magnetic-stripe
data), CAV2/CVC2/CVV2/CID, and PINs.
It’s also important to regularly review updated guidance, news, and the
latest version of the PCI DSS published by the PCI SSC @
https://www.pcisecuritystandards.org/
• Install the latest firmware: Firmware upgrades are easy and quick.
If there are any issues with the newly installed firmware, then rolling
back to the previous version can be achieved within minutes.
1. In the first step, it extracts the identity token from the message. To
verify the claims made by this token, the action authenticates it against
either an on-board ID store, or an external access control server. Once
2. In the second step, the action extracts the requested resource from the
message. It then checks if the authenticated user has permission to
access the requested resource.
3. In the final step, the action performs auditing and accounting. The
action records any access attempts, successful or unsuccessful, for
monitoring and non-repudiation purposes. Additionally, the action can
also perform post-processing steps, such as generating SAML or LTPA
tokens for single sign on. Data recorded/logged as part of the audit can
be properly encrypted to ensure that any sensitive user data is not
visible in the log files.
The logging utility works on the principle of publish and subscribe. Objects
publish log messages. Log targets subscribe to message streams. More
than one log target can subscribe to the same set of log messages. This
allows DataPower to distribute log messages to multiple destinations,
including network management consoles, file servers, and databases.
Again, Data recorded/logged as part of the audit can be properly
encrypted to ensure that the sensitive user data is not visible in the log
files.
4. Conclusion
The following were involved in deciding and validating the content along
with the author of this whitepaper:
• Steven Cawn
• Bob Johnson
• Christopher Khoury
• Shiu-Fun Poon
• Andrew White