We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic. Cookies are small files of information stored on your device that help us remember your preferences and improve your experience. By clicking âAccept Allâ, you consent to our use of cookies. You are able to reject all non-essential cookies or manage your preferences by . To learn more about our Online Digital and Cookie Notice,
click here.
This document describes the management of symmetric and asymmetric cryptographic keys that can be used to protect sensitive information in financial services related to retail payments. The document covers all aspects of retail financial services, including connections between a card-accepting device and an Acquirer, between an Acquirer and a card Issuer, and between an ICC and a card-accepting device. It covers all phases of the key life cycle, including the generation, distribution, utilization, archiving, replacement and destruction of the keying material. This document covers manual and automated management of keying material, and any combination thereof, used for retail financial services. It includes guidance and requirements related to key separation, substitution prevention, identification, synchronization, integrity, confidentiality and compromise, as well as logging and auditing of key management events. Requirements associated with hardware used to manage keys have also been included in this document.
Select the subscription format that is right for you. Table with 13 rows and 3 columns, identifies features available and not available for the two different subscription formats - CSA Advantage TM and CSA OnDemand TM