PCI PTS POI Device Security Requirements v6
PCI PIN Transaction Security requirements for Point of Interaction (POI) devices including PIN entry terminals, unattended payment terminals, and mobile payment acceptance devices. Covers physical tamper resistance, logical security, firmware integrity, secure boot, key management, and vendor qualification across 7 evaluation modules. Required for all POI device types seeking PCI approval.
AC Access Control
AU Audit and Accountability
CM Configuration Management
IA Identification and Authentication
MA Maintenance
MP Media Protection
| Control | Name | PCI PTS v6 References |
|---|---|---|
| MP-06 | Media Sanitization And Disposal | K |
PE Physical and Environmental Protection
| Control | Name | PCI PTS v6 References |
|---|---|---|
| PE-03 | Physical Access Control | ADI |
| PE-04 | Access Control For Transmission Medium | AC |
| PE-05 | Access Control For Display Medium | A |
| PE-06 | Monitoring Physical Access | AI |
| PE-18 | Location Of Information System Components | D |
| PE-19 | Information Leakage | A |
| PE-20 | Asset Monitoring and Tracking | AI |
PS Personnel Security
SA System and Services Acquisition
| Control | Name | PCI PTS v6 References |
|---|---|---|
| SA-03 | Life Cycle Support | H |
| SA-04 | Acquisitions | GH |
| SA-08 | Security Engineering Principles | F |
| SA-09 | External Information System Services | H |
| SA-10 | Developer Configuration Management | BF |
| SA-11 | Developer Security Testing | F |
| SA-15 | Development Process, Standards, and Tools | FH |
| SA-16 | Developer-Provided Training | H |
| SA-17 | Developer Security and Privacy Architecture and Design | F |
| SA-21 | Developer Screening | H |
SC System and Communications Protection
| Control | Name | PCI PTS v6 References |
|---|---|---|
| SC-07 | Boundary Protection | E |
| SC-08 | Transmission Integrity | EIJ |
| SC-12 | Cryptographic Key Establishment And Management | DE |
| SC-13 | Use Of Cryptography | CDEJ |
| SC-17 | Public Key Infrastructure Certificates | D |
| SC-23 | Session Authenticity | E |
| SC-28 | Protection of Information at Rest | C |
| SC-34 | Non-modifiable Executable Programs | B |
| SC-40 | Wireless Link Protection | J |
SI System and Information Integrity
SR Supply Chain Risk Management
| Control | Name | PCI PTS v6 References |
|---|---|---|
| SR-01 | Policy and Procedures | G |
| SR-02 | Supply Chain Risk Management Plan | G |
| SR-03 | Supply Chain Controls and Processes | G |
| SR-05 | Acquisition Strategies, Tools, and Methods | G |
| SR-06 | Supplier Assessments and Reviews | G |
| SR-09 | Tamper Resistance and Detection | AGI |
| SR-10 | Inspection of Systems or Components | AGI |
| SR-11 | Component Authenticity | AG |
| SR-12 | Component Disposal | GK |