Security Protocols
Security protocols form the technical backbone of PCI compliance, with issuers and acquirers implementing distinct methods based on their operational roles. These protocols secure transactions, protect cardholder data, and meet evolving regulatory requirements.
Issuer-Specific Protocols
Issuer-specific protocols include EMV 3-D Secure for card-not-present fraud prevention through risk-based step-up challenges. EMV 3DS 2.0 offers two-factor methods, replacing static passwords with biometrics, one-time passwords (OTPs), and risk-based checks. These protocols support in-app payments, IoT payments, and browser-based payments, enhancing transaction data for authentication decisioning.
End-to-End Encryption protects cardholder data from the payment terminal to issuer systems. The data remains encrypted during transmission, with only issuer systems able to decrypt the information, ensuring that service providers do not access cardholder data.
Acquirer-Specific Protocols
Acquirer-specific protocols use Point-to-Point Encryption (P2PE) to secure cardholder data from POS systems and processors. Payment data is encrypted at the POS system and stays encrypted until it reaches a secure processing environment for decryption. P2PE requires terminal encryption, secure algorithms, key management, and decryption environments.
Token vaults store surrogate values (tokens) mapped to primary account numbers (PANs). Token Service Providers (TSPs) manage token vaults, replacing PANs with tokens for transaction processing. Only token vaults can map tokens back to PANs, and both token vaults and those using tokens must ensure PCI compliance.
Issuer vs. Acquirer PCI Compliance: Comparison Overview