PCI-SSC P2PE Program Guide v3.0r1.0
PCI-SSC P2PE Program Guide v3.0r1.0
Program Guide
Version 3.0, Revision 1.0
December 2020
Document Changes
June 2012 1.0 Initial release of the PCI P2PE Program Guide
A P2PE Solution can be made up of Validated P2PE Applications and Validated P2PE
Components (refer to Figure 1.1) or can be validated as a standalone solution.
P2PE Applications and P2PE Components (all the boxes in blue in Figure 1.1) can be validated
and Listed on the Website on a standalone basis and made available for P2PE Components and
P2PE Solutions. Refer to Section 2.1.3, “P2PE Component Providers” for details on P2PE
Components.
The P2PE requirements and test procedures for validating P2PE Products can be found in the
corresponding P2PE Report on Validation (P-ROV) indicated by green text in Figure 1.1. P-
ROVs can be found on the Website.
For each P2PE Product to be Listed on the Website, Vendors must also submit P2PE
Attestations of Validation (P-AOVs), Acceptance fees, Vendor Release Agreements (VRAs), and
other supporting documents such as P2PE Application Implementation Guides and Instruction
Manuals, as applicable.
Once Listed, P2PE Products must be revalidated on an annual basis. Refer to Section 5.1,
“Annual Revalidation of P2PE Products,” for further details.
A complete P2PE Assessment in accordance with the P2PE Standard, Program, and all
associated documentation (a “Full Assessment”) is required on all Listed P2PE Products every
three years based on the Acceptance date of each Listing.
Any changes made to a Listed P2PE Product must be assessed as to the impact of the change
on the ability of that P2PE Product to continue to satisfy applicable P2PE Requirements. Refer
to Section 5.2, “Changes to P2PE Products,” for further details.
For a mapping of the P2PE Requirements to all P2PE Products, refer to the matrix in Appendix I,
“P2PE Applicability of Requirements.”
Note: PCI SSC reserves the right to require revalidation due to changes to the P2PE Standard
and/or due to specifically identified vulnerabilities in Listed P2PE Products.
PCI P2PE Report on Validation The P-ROV Reporting Templates are mandatory for
Reporting Template (“P-ROV completing a P2PE Assessment and include details on how
Reporting Template”) to document the findings of a P2PE Assessment. Refer to
Table 6.1 below for specific P-ROV types.
PCI Qualification Requirements for The P2PE Qualification Requirements are a baseline set of
Point-to-Point Encryption (P2PE) requirements that must be met by a QSA (P2PE) and/or
Qualified Security Assessors, QSA PA-QSA (P2PE) Company and QSA (P2PE) and/or PA-
(P2PE) and PA-QSA (P2PE) (or QSA (P2PE) Employees in order to perform P2PE
“P2PE Qualification Requirements”) Assessments.
PCI Data Security Standard The QSA Qualification Requirements are a baseline set of
Qualification Requirements For requirements that describe the necessary qualifications for
security companies and their employees to be qualified by
Qualified Security Assessors (QSA)
PCI SSC to perform PCI DSS Assessments.
(or "QSA Qualification
Requirements")
Vendor Release Agreement (“VRA”) The VRA establishes the terms and conditions under which
Validated P2PE Solutions, Validated P2PE Components,
and Validated P2PE Applications are Accepted and Listed
by PCI SSC.
The most current versions of the following supporting documents are used with the aforementioned
documents:
Payment Card Industry (PCI) Data Security Standard Requirements and Security Assessment
Procedures (PCI DSS)
Payment Card Industry (PCI) PIN Security Requirements
Payment Card Industry (PCI) PTS Hardware Security Module (HSM) Security Requirements
Payment Card Industry (PCI) PTS POI Modular Security Requirements
Payment Card Industry (PCI) PTS Device Testing and Approval Program Guide
PCI SSC reserves the right to change, amend, or withdraw security requirements or testing procedures
at any time. If such a change is required, PCI SSC will endeavor to work closely with PCI SSC’s
community of Participating Organizations, P2PE Solution Providers, P2PE Component Providers, P2PE
Application Vendors, and P2PE Assessor Companies to help minimize the impact of any changes.
1.4 Terminology
Throughout this document the following terms have the meanings set forth in this Section 1.4 or in the
PCI P2PE Glossary of Terms, Abbreviations, and Acronyms (available on the Website), as applicable:
Delta Assessment Partial P2PE Assessment performed against applicable P2PE Requirements
when changes to a Listed P2PE Solution, Listed P2PE Application, or Listed
P2PE Component are eligible for review under the “Delta Assessment”
change-review process described herein.
Expired P2PE Product A P2PE Product (P2PE Solution, P2PE Component, or P2PE Application)
listed on the P2PE Expired Listings that is no longer considered a Validated
P2PE Product.
List of Validated P2PE The Council’s authoritative List of Validated P2PE Applications appearing on
Applications the Website.
List of Validated P2PE The Council’s authoritative List of Validated P2PE Components appearing on
Components the Website.
List of Validated P2PE Refers to the List of Validated P2PE Solutions, List of Validated P2PE
Products Components, and the List of Validated P2PE Applications.
List of Validated P2PE The Council’s authoritative List of Validated P2PE Solutions appearing on the
Solutions Website.
Listing Refers to the listing and related information regarding a P2PE Product on the
applicable List of Validated P2PE Products on the Website.
P2PE Application Assessment of a P2PE Application against applicable P2PE Requirements in
Assessment order to validate compliance with the P2PE Standard as part of the P2PE
Program.
Authorize the P2PE Assessor Company to submit resulting P-ROVs and related information to
PCI SSC.
Hosts the List of Validated P2PE Solutions, the List of Validated P2PE Components, and the List
of Validated P2PE Applications on the Website;
Provides required training for and qualifies QSA (P2PE) and PA-QSA (P2PE) Companies and
Employees to assess and validate P2PE Products against the P2PE Standard;
Maintains and updates the P2PE Standard and related documentation; and
– Reviews all P-ROVs submitted to PCI SSC and related change submissions for
compliance with baseline quality standards, including but not limited to, confirmation that:
– Submissions (including P-ROVs, updates and Annual Revalidations are correct as to
form;
– QSA (P2PE) and PA-QSA (P2PE) Companies properly determine whether candidate
P2PE Products are eligible for validation under the P2PE Program (PCI SSC reserves
the right to reject or de-list any P2PE Solution, P2PE Component, and/or P2PE
Application determined to be ineligible for the P2PE Program);
– QSA (P2PE) and PA-QSA (P2PE) Companies adequately report the P2PE compliance of
candidate Products in their associated submissions; and
– Detail provided in such submissions meets PCI SSC‘s reporting requirements.
As part of the PCI SSC quality assurance (QA) process, PCI SSC assesses whether overall, QSA
(P2PE) and PA-QSA (P2PE) Company operations appear to conform to PCI SSC‘s quality assurance
and qualification requirements.
Note: PCI SSC does not assess or validate P2PE Products for P2PE compliance; assessment and
validation is the role of the QSA (P2PE) and/or PA-QSA (P2PE) Company, as applicable. Listing of a
P2PE Solution, P2PE Component, and/or P2PE Application on the List of Validated P2PE Solutions, List
of Validated P2PE Components, and/or List of Validated P2PE Applications signifies only that the
applicable P2PE Assessor Company has determined that the P2PE Product complies with the P2PE
Standard, that the P2PE Assessor Company has submitted the corresponding P-ROV(s) to PCI SSC,
and that the P-ROV(s), as submitted to PCI SSC, has satisfied all requirements of the PCI SSC for P-
ROVs as of the time of PCI SSC's review.
QSA (P2PE): QSA (P2PE) Companies are QSA companies that have been additionally
qualified by PCI SSC to perform P2PE Assessments of P2PE Solutions and
P2PE Components. QSA (P2PE) Companies are not qualified by PCI SSC
to perform P2PE Application Assessments.
PA-QSA (P2PE): PA-QSA (P2PE) Companies are PA-QSA companies that have been
additionally qualified by PCI SSC to perform P2PE Assessments of P2PE
Solutions, P2PE Components, and P2PE Applications.
As indicated above, PCI SSC does not approve P-ROVs from a technical compliance perspective but
performs quality assurance to confirm that P-ROVs adequately document the demonstration of
compliance.
2.5 Customers
Customers using a Validated P2PE Solution to facilitate their PCI DSS compliance are responsible for:
Note: Device evaluation by a PCI-recognized Laboratory is a separate process from the validation that
occurs as part of a P2PE Assessment; the P2PE Assessment validates whether or not a given P2PE
Product (which may include multiple POI/HSM devices) is in compliance with the P2PE Standard.
Note: The results of Merchant-Managed P2PE Solution assessments are not submitted to PCI SSC for
validation, and Merchant-Managed P2PE Solutions are not Listed.
1) The P2PE Vendor selects a P2PE Assessor Company from PCI SSC’s List of P2PE Qualified
Security Assessor Companies and negotiates the cost and any associated P2PE Assessor
Company confidentiality and non-disclosure agreements with the P2PE Assessor Company.
2) The P2PE Vendor then provides to the P2PE Assessor Company its executed VRA and access
to the applicable P2PE Solution, P2PE Component(s), and/or P2PE Application(s) to be
assessed, POI device types, corresponding Implementation Guides for P2PE Applications, P2PE
Instruction Manual for P2PE Solutions, and all associated manuals and other required
documentation.
3) Refer to Section 2.1.4, “Use of Third-Party Service Providers,” in this document to understand
options for validating P2PE Component functions and services provided by Third-Party Service
Providers. The P2PE Assessor Company then assesses the P2PE Solution, P2PE
Component(s), and/or P2PE Application(s), including its security functions and features, using the
appropriate P-ROV(s), to determine whether it complies with the P2PE Standard.
4) If the P2PE Assessor Company determines that the P2PE Solution, P2PE Component(s), and/or
P2PE Application is in compliance with the P2PE Standard, the P2PE Assessor Company
submits the corresponding P-ROV(s) to PCI SSC, attesting to compliance and setting forth the
results, opinions, and conclusions of the P2PE Assessor Company on all test procedures along
with the P2PE Vendor’s signed VRA and the corresponding P-AOV. Refer to Appendix A, “P2PE
Products and Acceptance,” for more details on Acceptance.
5) PCI SSC issues an invoice to the P2PE Vendor for the applicable P2PE Acceptance Fee. After
the P2PE Vendor has paid the invoice, PCI SSC reviews the submission to confirm that it meets
the P2PE Program requirements and if confirmed, PCI SSC notifies the P2PE Assessor
Company and P2PE Vendor that the P2PE Solution, P2PE Component(s), and/or P2PE
Application(s) have completed the process.
6) Once the above process is complete for the submitted P2PE Solution, P2PE Component(s),
and/or P2PE Application(s), PCI SSC signs the corresponding P-AOV and adds the P2PE
Solution, P2PE Component(s), and/or P2PE Application(s) to the corresponding List of Validated
P2PE Products on the Website.
Process Illustration
P2PE Assessment of P2PE Products Intended for PCI SSC Listing Figure 1
1) The Merchant selects a P2PE Assessor Company from the PCI Note: Refer to Section 2.1.4,
SSC List of P2PE Qualified Security Assessor Companies and “Use of Third-Party Service
negotiates the cost and any associated P2PE Assessor Providers” in this document to
Company confidentiality and non-disclosure agreements with understand options for
the P2PE Assessor Company. validating Third-Party Service
Providers.
2) The Merchant provides the P2PE Assessor Company access to the MMS to be assessed, PCI-
approved POI Device Types, corresponding Implementation Guides for P2PE Applications, P2PE
Instruction Manual for MMS, and all associated manuals and other required documentation.
3) The P2PE Assessor Company assesses the MMS, including its security functions and features, to
determine whether the MMS complies with the P2PE Standard.
4) If the P2PE Assessor Company determines that the MMS is in compliance with the P2PE Standard,
the P2PE Assessor Company prepares and submits to the Merchant a corresponding P2PE
Merchant-Managed Solution P-ROV attesting to compliance and setting forth the results, opinions
and conclusions of the P2PE Assessor Company on all test procedures.
Note: Merchant-Managed P2PE Solutions are not eligible for listing on the Website, and the
corresponding P-ROV(s) is not submitted to PCI SSC. A Merchant-Managed P2PE Solution may utilize
Third-Party Service Providers, Validated P2PE Applications, and/or Validated P2PE Components.
SCDs Validated P2PE Solutions and P2PE Components require the use of various types of
Secure Cryptographic Devices (SCDs). To assist in evaluating these device types
for use in a P2PE Solution, note the following:
Refer to “Definition of Secure Cryptographic Devices (SCDs) to be used in P2PE
Solutions” in the P2PE Standard.
Obtaining and maintaining PCI PTS HSM or FIPS 140 device approval is the
responsibility of the secure cryptographic device vendor. P2PE Assessors will
request evidence of device approvals being in place and current as part of
performing a P2PE Assessment.
An existing P2PE Program approval of a Listed P2PE Solution or a Listed P2PE
Component may be reassessed up to but not exceeding three years past the
expiry date of any PCI-listed HSMs already included in the corresponding P2PE
Solution or P2PE Component approval. This will be checked as part of the
reassessment and submittal process to PCI SSC. As the reassessment
(provided it results in an updated P2PE listing) is valid for three years, this will
allow vendors to continue to use the expired HSMs for up to a total of six years
after any associated PCI PTS HSM listings have expired, depending on their
reassessment date.
The following table provides the current PCI PTS HSM expiry dates and the
corresponding reassessment window for P2PE Solutions and applicable P2PE
Components using these devices:
* Existing Listed P2PE Solutions and applicable Listed P2PE Components are prohibited
from reassessment with any expired HSMs that exceed the reassessment date shown
relative to the associated PCI PTS HSM version. E.g., Any Listed P2PE Solution or Listed
P2PE Component using a v1.x PCI HSM will be prohibited from reassessment after April 29,
2022.
** P2PE Solutions and applicable P2PE Components must have replaced any expired HSMs
with current (non-expired) HSMs by this date.
SCDs Existing PCI P2PE approvals of Validated P2PE Products with expired PCI-
(continued) approved POI devices may be revalidated and reassessed for up to, but not
exceeding, five years past the PCI-approved POI device expiry dates (as
appearing on the PCI SSC List of Approved PTS Devices) used in the
corresponding P2PE Product. A PCI-approved POI device may not be used in a
Listed P2PE Product more than five years past the corresponding PCI-approved
POI device expiry date. A Validated P2PE Product will be delisted if all of its
associated POI device types have exceeded the five-year window (as shown in
the table below).
The following table provides the current PCI-approved POI device expiry dates
and the corresponding revalidation/reassessment window for P2PE Products
using these devices
1.x EXPIRED 2014 N/A – v1.x devices are not P2PE eligible
2.x EXPIRED April 2017 29 April 2022
3.x 30 April 2021 29 April 2026
4.x 30 April 2023 29 April 2028
5.x 30 April 2026 29 April 2031
* There may be regional variations⎯please check with the respective payment brands to
determine any variances in the dates shown above.
Device vendors wishing to obtain PCI approval should consult the Website for
further information. Obtaining PCI approval does not replace or supersede any
payment card brand-specific device-approval processes.
P2PE Note: Specific P2PE Components can be used as part of other specific P2PE
Components Component Assessments. Refer to Table 6.1, “P-ROVs to be used for P2PE v3
Assessments”.
The independent PCI SSC listing of Third-Party Service Provider component
services depends on eligibility and is optional. However, such independent listing is
required for a given component service to be recognized as a Validated P2PE
Component that can be used in multiple P2PE Solutions and/or P2PE Components
without the need for a Full Assessment of those services each time they are used
with a different P2PE Solution and/or P2PE Component.
For P2PE Solution Assessments or P2PE Component Assessments (that use
another P2PE Component):
• If a P2PE Component is currently listed on the List of Validated P2PE
Components, the applicable P2PE Component P-ROV has already been
Accepted by PCI SSC. As a result, any Listed P2PE Components included in
a P2PE Solution or P2PE Component Assessment only need to be identified in
the P2PE Solution P-ROV or the applicable P2PE Component P-ROV,
respectively, and an assessment of that already-Listed P2PE Component is
not required as part of the P2PE Solution or P2PE Component Assessment
submission.
• If a P2PE Component that is included in a P2PE Solution or applicable P2PE
Component Assessment is not already on the List of Validated P2PE
Components but is being submitted to PCI SSC for Acceptance and Listing on
the List of Validated P2PE Components, the applicable P2PE Component P-
ROV must be submitted to PCI SSC for review and Accepted before the P-
ROVs of the P2PE Solution or applicable P2PE Component Assessment that it
is included in can be Accepted.
• If independent listing is not being pursued for a P2PE Component, this is
instead considered a Third-Party Service Provider’s service offering and it is
only an element of the specific P2PE Solution or P2PE Component within
which it is assessed.
Third-Party Refer to the Section 2.1.4, “Use of Third-Party Service Providers,” in this document
Service to understand options for validating P2PE Component services or functions provided
Provider by Third-Party Service Providers.
Review the requirements of both the PCI DSS and the P2PE Standard and all related
documentation located at the Website.
Determine/assess the P2PE Solution’s, P2PE Component’s, or P2PE Application’s readiness to
comply with the P2PE Standard: Select the appropriate P-ROV(s) based on the type of P2PE
Assessment. Refer to Table 6.1, “P-ROVs to be used for P2PE v3 Assessments.”
Determine whether the P2PE Application Vendor’s Implementation Guide meets P2PE Standard
requirements and correct any gaps.
Determine whether the P2PE Solution Provider’s P2PE Instruction Manual (PIM) meets P2PE
Standard requirements and correct any gaps.
How close the P2PE Product is compliant with the P2PE Standard at the start of the P2PE
Assessment
Corrections to the P2PE Product to achieve compliance will delay validation.
For P2PE Solutions and P2PE Components that use P2PE Applications and/or P2PE
Components
Those that are being Listed on the Website separately must be Listed before the P2PE Solution or
the P2PE Component can be reviewed and Accepted.
Whether the P2PE Application’s Implementation Guide and/or the P2PE Solution’s P2PE
Instruction Manual meets all P2PE Requirements at the start of the Assessment
Extensive rewrites will delay validation.
Any P2PE Assessment timeframes provided by a P2PE Assessor Company should be considered
estimates, since they may be based on the assumption that the P2PE Product is able to successfully
meet all P2PE Requirements quickly. If problems are found during review or Acceptance processes,
discussions between the P2PE Assessor Company, the P2PE Vendor, and/or PCI SSC may be
required. Such discussions may significantly impact review times and cause delays and/or may even
cause the review to end prematurely (for example, if the P2PE Vendor decides it does not want to make
the necessary changes to achieve compliance).
For each P2PE Assessment, the resulting P2PE Assessor report must follow the P2PE Report on
Validation (P-ROV) template and instructions, as outlined in the corresponding P-ROV Reporting
Template. Refer to Table 6.1, “P-ROVs to be used for P2PE v3 Assessments.”
The P2PE Assessor Company must prepare each P-ROV based on evidence obtained by
following the P2PE Standard.
Prior to submitting to PCI SSC, the P2PE Assessor Company must perform a review of all
documents to ensure they are consistent and meet PCI SSC’s requirements and quality standards.
Each P2PE Product (including all applicable P-ROVs) submitted to PCI SSC for Acceptance and
Listing must be accompanied by a corresponding P2PE Attestation on Validation (P-AOV) in the
form available through the Website, signed by a duly authorized officer of the P2PE Assessor
Company, that summarizes whether the entity is in compliance or is not in compliance with the
P2PE Standard and any related findings, as well as the P2PE Application Implementation Guide
(as applicable) and P2PE Instruction Manual.
If PCI SSC does not already have the P2PE Vendor’s signed copy of the then-current VRA, the
P2PE Assessor Company must provide the P2PE Vendor’s signed copy of the then-current VRA
to PCI SSC, along with the P-ROV(s) submission.
If PCI SSC does already have the P2PE Vendor’s signed copy of the then-current VRA, the P2PE
Assessor is not required to re-submit the same VRA to PCI SSC at that time.
The Portal is also used by PCI SSC to track all communications relating to a submission.
All Program fees are non-refundable and are subject to change upon posting of revised fees on the
Website.
PCI SSC will generally send a courtesy reminder e-mail to the P2PE Vendor’s contact (as identified in
the applicable P-AOV) within 90 days prior to the relevant Annual Revalidation/Reassessment date, but
it is the sole responsibility of the P2PE Vendor to maintain the listing regardless of any such courtesy
reminder(s).
As part of this annual process, P2PE Vendors are required to confirm whether any changes have been
made to the P2PE Product, and that:
a) Changes have been applied in a way that is consistent with the Note: Vendors are required
P2PE Standard; to annually submit a P-AOV
to confirm their P2PE
b) The P2PE Product continues to meet the requirements of the Product continues to meet
P2PE Standard; the P2PE Standard.
c) POI devices or HSMs that are part of the P2PE Product
continue to be acceptable for use in a P2PE Product. Refer to Table 4.1, “Program Guidance,”
for SCDs regarding expired POI devices and HSMs.
d) PCI SSC has been advised of any change that necessitates a change to the listing on the
Website, in accordance with the P2PE Program Guide.
The P2PE Vendor is required to give consideration to the impact of external threats and whether
updates to the P2PE Product are necessary to address changes to the external threat environment.
The updated P-AOV should be submitted via e-mail to the PCI SSC P2PE Program Manager. If an
updated P-AOV is not submitted and Accepted by PCI SSC on or before the P2PE Product’s current
Annual Revalidation Date, the P2PE Product will be subject to early administrative expiry, as follows:
The corresponding P2PE Product Listing will be updated to show the P2PE Product’s Annual
Revalidation date in Orange for a period up to 90 consecutive calendar days unless the Annual
Revalidation requirements of the Program are satisfied.
If the updated and complete P-AOV is received by PCI SSC within this initial 90-day period, PCI
SSC will, upon Acceptance, remove the Orange status from the P2PE Product Listing. If the
updated and complete P-AOV is not received by PCI SSC within this initial 90-day period, the
New Validation: If the P2PE Vendor wishes the Listed P2PE Product to remain on the
corresponding List of Validated P2PE Products on the Website, the P2PE Vendor
must contact a P2PE Assessor Company to perform a Full Assessment of the
P2PE Product against the P2PE Standard and Program, resulting in a new
Acceptance, on or before the Listed P2PE Product’s applicable Reassessment
date. This reassessment must follow the same process as an initial P2PE
Assessment of the applicable P2PE Product.
Expiry: A Listed P2PE Product for which a new Acceptance has not occurred on or before
the Listed P2PE Product’s applicable Reassessment date will immediately appear
in Orange for up to 90 consecutive calendar days, and in Red thereafter for up to
90 additional consecutive calendar days. If a new Acceptance has not occurred
within 180 days following the Listed P2PE Product’s applicable Reassessment
date, the P2PE Product will become an Expired P2PE Product and be moved to the
P2PE Expired Listings. Expired P2PE Products are no longer considered Validated
P2PE Products.
Once PCI SSC receives the completed P-ROV(s) and all other required materials and applicable
fees, PCI SSC reviews the submission from a quality-assurance perspective and determines
whether it is acceptable. Subsequent iterations will also be responded to, typically within 30
calendar days of receipt. If the P-ROV(s) meet all applicable quality assurance requirements (as
documented in the QSA Qualification Requirements and related P2PE Program materials), PCI
SSC sends a countersigned P-AOV to both the P2PE Vendor and the P2PE Assessor Company
and adds the product to the List of Validated P2PE Solutions, List of Validated P2PE
Components, or List of Validated P2PE Applications, as applicable.
PCI SSC communicates any quality issues associated with P-ROVs to the P2PE Assessor
Company. It is the responsibility of the P2PE Assessor Company to resolve those issues with PCI
SSC and/or the P2PE Vendor, as applicable. Such issues may be limited or more extensive:
More extensive issues may require the P2PE Assessor Company to perform further testing,
requiring the P2PE Assessor Company to notify the P2PE Vendor that re-testing is needed
and to schedule that testing with the P2PE Vendor.
P-ROV(s) that have been returned to the P2PE Assessor Company for correction must be
resubmitted to the PCI SSC within 30 days of the preceding submission. If this is not possible, the
P2PE Assessor Company must inform the PCI SSC of the timeline for response. Lack of
response on P-ROV(s) returned to the P2PE Assessor Company for correction may result in the
submission being closed. Submissions that have been closed will not be reopened and must be
resubmitted as if they are new P-ROV submissions.
P2PE P2PE Application Any P2PE Assessment for software on the PCI-approved
Application POI devices intended for use in a P2PE Solution that has
the potential to access clear-text cardholder data must
complete this P-ROV.
There must be consistency between the information in documents submitted for review via the Portal
and the “Details” fields within the Portal. Common errors in submissions include inconsistent application
names or contact information and incomplete or inconsistent documentation. Incomplete or inconsistent
submissions may result in a significant delay in the processing of requests for listing and/or may be
rejected by PCI SSC.
6.2.2 Resubmissions
For subsequent reviews, if multiple iterations of a P-ROV(s) are required before PCI SSC accepts
the report, the P2PE Assessor must submit P-ROV(s) versions that include tracking of cumulative
changes within the document.
No P2PE Vendor or other third party may refer to a P2PE Product as “PCI Approved,” or “PCI SSC
Approved” or otherwise state or imply that PCI SSC has, in whole or part, approved any aspect of a P2PE
Vendor or its P2PE Product, except to the extent and subject to the terms and restrictions expressly set
forth in a written agreement with PCI SSC, or in a corresponding P-AOV provided by PCI SSC. All other
references to PCI SSC’s acceptance of a P2PE Product are strictly and actively prohibited by PCI SSC.
When granted, PCI SSC Acceptance is provided to ensure certain security and operational characteristics
important to the achievement of PCI SSC’s goals, but such acceptance does, not under any
circumstances, include or imply any endorsement or warranty regarding the P2PE Solution Provider or
the functionality, quality, or performance of the P2PE Product or any other product or service. PCI SSC
does not warrant any products or services provided by third parties. PCI SSC acceptance does not, under
any circumstances, include or imply any product warranties from PCI SSC, including, without limitation,
any implied warranties of merchantability, fitness for purpose or non-infringement, all of which are
expressly disclaimed by PCI SSC. All rights and remedies regarding products and services that have
received acceptance from PCI SSC shall be provided by the party providing such products or services,
and not by PCI SSC or any Participating Payment Brand.
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix A December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 47
Appendix B: Elements for the List of Validated P2PE
Solutions
Company (Link to Company website)
This entry denotes the P2PE Solution Provider for the validated P2PE Solution.
Field Format
Year of listing 4 digits + hyphen
Solution Provider # 5 digits + period (assigned alphabetically initially,
then as received)
Individual Solution Number # 3 digits
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix B December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 48
This section identifies PCI-approved HSM devices validated for use with this P2PE Solution,
including the HSM expiry date and a website link to the corresponding PCI PTS-approval on the
List of Approved PIN Transaction Security Devices.
FIPS 140 Validated HSMs Supported
This section identifies FIPS 140 validated HSMs for use with this P2PE Solution, including the
NIST Cryptographic Module Validation Program (CMVP) certificate number and sunset date. A
website link will be provided to the appropriate entry in the NIST CMVP database of validated
cryptographic modules.
P2PE Applications Supported
This section identifies the P2PE Applications validated for use with this P2PE Solution, including
the P2PE Application’s Reassessment date.
A P2PE Solution may include P2PE Applications that were evaluated as part of the Solution
Assessment that are not separately Listed on the List of Validated P2PE Applications. P2PE
Applications in this case are not denoted on the P2PE Solution Listing. Any use of such an
application in another P2PE Product would require either independent listing as a Listed P2PE
Application, if eligible, or assessment as part of each P2PE Product the application is part of.
P2PE Components Supported
This section identifies the P2PE Components validated for use with this P2PE Solution including
the Reassessment date of the P2PE Component.
While a P2PE Solution may include third-party services (including services potentially eligible for
Listing as a P2PE Component, such as CA/RA or KIF), those third-party services are not
identified within the P2PE Solution’s Listing or on the List of Validated P2PE Components. Any
use of such a component in another P2PE Product would require either independent listing as a
P2PE Component, if eligible, or assessment as part of each P2PE Product where the third-party
services are used.
PCI-Approved POI Devices Supported
This section identifies PCI-approved POI devices validated for use with this P2PE Solution and
will include relevant PCI PTS reference numbers and expiry dates of the PCI PTS approval. A
website link will be provided to the appropriate entry on the PCI List of Approved PIN Transaction
Security Devices.
P2PE Version
“P2PE Version” is used by PCI SSC to denote the standard, and the specific version thereof, used to
assess the compliance of a Validated P2PE Solution.
P2PE Assessor
This entry denotes the name of the qualified P2PE Assessor Company that performed the validation
and determined that the P2PE Solution is compliant with the P2PE Standard and Program.
Regions Served
This section allows for the submission of a description of geographic regions in which this P2PE
Solution is available—for example, Global or US, Brazil.
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix B December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 49
Reassessment Date
The Reassessment Date for a Validated P2PE Solution is the date by Note: Listed P2PE
which the P2PE Solution Provider must have the P2PE Solution undergo Solutions are valid for a
a Full Assessment against the P2PE Standard and Program in order to period of three years from
maintain the Acceptance. their initial Acceptance
Date.
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix B December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 50
Appendix C: Elements for the List of Validated P2PE
Components
The list of recognized P2PE Component Providers for the List of Validated P2PE Components:
Encryption-management services (EMS)
– Encryption Management
– POI Management
– POI Deployment
Decryption-management services (DMS)
– Decryption Management
Key Management Services (KMS)
– Key-Injection Facility (KIF)
– Key Management
– Key Loading
– Certification Authority/Registration Authority (CA/RA)
Each contains the same listing elements below:
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix C December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 51
An example reference number is 2015-XXXXX.XXX consisting of the following:
Field Format
Year of listing 4 digits + hyphen
Component Provider # 5 digits + period (assigned alphabetically initially,
then as received)
Individual Component Number # 3 digits
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix C December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 52
P2PE Components Supported
This section identifies the P2PE Components validated for use with this P2PE Component
including the Reassessment date of the P2PE Component.
While a P2PE Component may include third-party services (including those offering
services potentially eligible for Listing as a P2PE Component, such as CA/RA or KIF),
those third-party services are not listed within the P2PE Component or on the List of
Validated P2PE Components. Any use of such a component in another P2PE Product
would require either independent listing as a P2PE Component, if eligible, or assessment
as part of each P2PE Product of which the P2PE Component is a part of.
P2PE Version
“P2PE Version” is used by PCI SSC to denote the standard, and the specific version thereof, used
to assess the compliance of a Validated P2PE Component.
P2PE Assessor
This entry denotes the name of qualified P2PE Assessor Company that performed the validation
and determined that the P2PE Component is compliant with the P2PE Standard and Program.
Reassessment Date
The Reassessment Date for a Validated P2PE Component is the date Note: Listed P2PE
by which the P2PE Component Provider must have the P2PE Components are valid for
Component undergo a Full Assessment against the P2PE Standard a period of three years
and Program in order to maintain the Acceptance. from their initial
Acceptance date.
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix C December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 53
Appendix D: Elements for the List of Validated P2PE
Applications
Company (link to Company website)
This entry denotes the P2PE Application Vendor for the Validated P2PE Application.
Field Format
Year of listing 4 digits + hyphen
P2PE Application Vendor # 5 digits + period (assigned alphabetically initially,
then as received)
P2PE Application Vendor App # 3 digits (assigned as received)
Minor version period + 3 alpha characters (assigned as received)
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix D December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 54
P2PE Application Details
Clicking on this link brings up a list of details specific to this P2PE Application consisting of
the following fields (fields are explained in detail below):
- PCI-approved POI Devices Supported
P2PE Version
“P2PE Version” is used by PCI SSC to denote the standard, and the specific version thereof, used to
assess the compliance of a Validated P2PE Application.
P2PE Assessor
This entry denotes the name of qualified PA-QSA (P2PE) Assessor Company that performed the
validation and determined that the P2PE Application is compliant with the P2PE Standard and Program.
Reassessment Date
The Reassessment Date for a Validated P2PE Application is the date Note: Listed P2PE
by which the P2PE Application Vendor must have the application Applications are valid for
undergo a Full Assessment against the P2PE Standard and Program in a period of three years
order to maintain the Acceptance. from their initial
Acceptance Date.
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix D December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 55
Appendix E: Change Impact Template for Listed P2PE Solutions
This P2PE Change Impact Template is required for Administrative Change and Delta Change submissions for Listed P2PE Solutions. Refer to the
P2PE Program Guide v3 for information on changes to Listed P2PE Products.
The P2PE Vendor and/or P2PE Assessor Company must complete each section of this document and all other required documents based on the
type of change to the Listed P2PE Solution. The P2PE Assessor Company is required to submit this P2PE Change Impact along with supporting
documentation to PCI SSC for review. Refer to section 5.2, “Changes to P2PE Products”.
Part 1. P2PE Solution Details, Contact Information, and Change Type
Submission Date
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix E December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 56
Part 2. Details for Administrative Change (if indicated at Part 1)
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix E December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 57
Part 3. Details for Delta Change (if indicated at Part 1)
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix E December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 58
Part 3a. Add/Remove POI Device Type (if indicated at Part 3)
Add additional rows or pages as necessary if multiple POI Device Types are being added/removed in a single change submittal.
Perform a red-lined P-ROV review for the added POI Device Type(s) using the table below as a minimum set of testing procedures.
Note: The above testing does not have to be performed by the Listed P2PE Solution undergoing the Delta Change if the POI Device Type being
added as part of this Delta Change was already tested as part of, and denoted on, a Listed P2PE Component, where the Listed P2PE Component
is already denoted in the Solution Details of the Listed P2PE Solution.
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix E December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 59
Part 3b. Add/Remove HSM (if indicated at Part 3)
HSM
Adding for inclusion in listing or Addition/Inclusion in listing Removal from listing
removal from listing? (Red-lined P-ROV review required, refer to details below) (No Red-lined P-ROV review required)
HSM name/identifier
Copy the above table for each additional HSM model being added or removed.
Perform a red-lined P-ROV review for the added HSM using the table below as a minimum set of testing procedures.
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix E December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 60
Part 3c. Add/Remove P2PE Application (if indicated at Part 3)
P2PE Applications
Adding for inclusion in listing or Addition/Inclusion in listing Removal from listing
removal from listing? (Red-lined P-ROV review required, refer to details (No Red-lined P-ROV review required)
below)
P2PE P2PE Brief description of P2PE POI Device Type
P2PE Application P2PE Application
Application Application Application name/identifier P2PE
Name Reference #
Version # Vendor Name function/purpose Application is installed on
Perform a red-lined P-ROV review for the added P2PE Application using the table below as a minimum set of testing procedures.
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix E December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 61
Part 3d. Add/Remove P2PE Component (if indicated at Part 3)
P2PE Component
Adding for inclusion in listing or Addition/Inclusion in listing Removal from listing
removal from listing? (Red-lined P-ROV review required, refer to details (No Red-lined P-ROV review required)
below)
Type of P2PE Component (select only one)
P2PE Component SSC Listing
Provider Name Key Key Encryption POI POI Decryption Number
KIF CA/RA Management
Loading Mgmt Mgmt Deployment Mgmt
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix E December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved Page 62
Appendix F: Change Impact Template for P2PE Components
This P2PE Change Impact Template is required for Administrative Change and Delta Change submissions for Listed P2PE Components. Refer to
the applicable P2PE Program Guide v3 for information on changes to Listed P2PE Products.
The P2PE Vendor and/or P2PE Assessor Company must complete each section of this document and all other required documents based on the
type of change to the Listed P2PE Product. The P2PE Assessor Company is required to submit this P2PE Change Impact along with supporting
documentation to PCI SSC for review. Refer to section 5.2, “Changes to P2PE Products”.
Part 1. P2PE Component Details, Contact Information, and Change type
Type of Change Administrative (Complete Part 1 and 2 ONLY) Delta (Complete Part 1 and applicable sections of Part 3 ONLY)
(Select one ONLY)
Submission Date
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix F December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 63
Part 2. Details for Administrative Change (if indicated at Part 1)
Add Remove
Add/Remove P2PE Application (Complete Part 3c)
Version Number of the Application:
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix F December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 64
Part 3a. Add/Remove POI Device Type (if indicated at Part 3)
Add additional rows or pages as necessary if multiple POI Device Types are being added/removed in a single change submittal.
Perform a red-lined P-ROV review for the added POI Device Type(s) using the table below as a minimum set of testing procedures.
Note: The above testing does not have to be performed by the Listed P2PE Component undergoing the Delta Change if the POI Device Type
being added as part of this Delta Change was already tested as part of, and denoted on, a Listed P2PE Component, where that Listed P2PE
Component is already denoted in the Component Details of the Listed P2PE Component undergoing the Delta Change.
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix F December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 65
Part 3b. Add/Remove HSM (if indicated at Part 3)
HSM
Adding for inclusion in listing or Addition/Inclusion in listing Removal from listing
removal from listing? (Red-lined P-ROV review required, refer to details (No Red-lined P-ROV review required)
below)
HSM name/identifier
Copy the above table for each additional HSM model being added or removed.
Perform a red-lined P-ROV review for the added HSM using the table below as a minimum set of testing procedures.
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix F December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 66
Part 3c. Add/ Remove P2PE Application (if indicated at Part 3)
P2PE Applications
Adding for inclusion in listing or Addition/Inclusion in listing Removal from listing
removal from listing? (Red-lined P-ROV review required, refer to details below) (No Red-lined P-ROV review required)
P2PE
P2PE POI Device Type
P2PE Application Application P2PE Application Brief description of P2PE Application
Application name/identifier P2PE
Name P2PE Vendor Reference # function/purpose
Version # Application is installed on
Name
Perform a red-lined P-ROV review for the added P2PE Application using the table below as a minimum set of testing procedures.
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix F December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 67
Part 3d. Add/Remove P2PE Component (if indicated at Part 3)
P2PE Component
Adding for inclusion in listing or Addition/Inclusion in listing Removal from listing
removal from listing? (Red-lined P-ROV review required, refer to details (No Red-lined P-ROV review required)
below)
Type of P2PE Component (select only one)
P2PE Component Provider Name POI Key SSC Listing Number
POI Deployment Key Loading
Management Management
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix F December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 68
Appendix G: Change Impact Template for P2PE Applications
This P2PE Change Impact Template is required for Administrative Change and Delta Change submissions for Listed P2PE Applications. Refer to
the applicable P2PE Program Guide v3 for information on changes to Listed P2PE Products.
The P2PE Application Vendor and/or P2PE Assessor Company must complete each section of this document and all other required documents
based on the type of change to the Listed P2PE Application. The P2PE Assessor Company is required to submit this P2PE Change Impact along
with supporting documentation to PCI SSC for review. (Refer to Section 5.2, “Delta Changes for P2PE Products”).
Part 1. P2PE Application Details, Contact Information, and Change Type
Submission Date
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix G December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 69
Part 2. Details for Administrative Change (if indicated at Part 1)
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix G December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 70
Part 3. Details for Delta Change (if indicated at Part 1)
For each Delta Change eligible for Assessment, provide the following information. Any that impact P2PE Requirements must be reflected in the
red-lined P-ROV submitted. Use additional pages and/or add rows if needed.
Description of why the change is necessary Description of how P2PE functionality is Description of how P2PE Requirements/sub-
impacted Requirements are impacted
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix G December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 71
Part 3a. Add/Remove POI Device Type (if indicated at Part 3)
Add additional rows or pages as necessary if multiple POI Device Types are being added/removed in a single change submittal
Perform a red-lined P-ROV review for the added POI Device types using the table below as a minimum set of testing procedures.
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix G December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 72
Appendix H: P2PE Application Software Versioning Methodology
P2PE Application Vendors are required to document and follow a software versioning methodology as part of their system development lifecycle.
Additionally, P2PE Application Vendors must communicate the versioning methodology to their customers and integrators/resellers in the P2PE
Application Implementation Guide. Customers and integrators/resellers require this information to understand which version of the application they
are using and the types of changes that have been made to each version of the application. P2PE Assessor Companies are required to verify the
P2PE Application Vendor is adhering to the documented versioning methodology and the requirements of the P2PE Program Guide as part of the
P2PE Assessment. Note that if a separate version-numbering scheme is maintained internally by the P2PE Application Vendor, a method to
accurately map the internal version numbers to the publicly listed version number(s) must be documented and maintained by the P2PE
Application Vendor.
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix H December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 73
The P2PE Application Vendor must document how elements of the application version number are used to identify:
Types of changes made to the application—for example, major release, minor release, maintenance release, wildcard, etc.
Changes that have no impact on the functionality of the application or its dependencies
Changes that have impact on the application functionality but no impact on security or P2PE Requirements
Changes that impact any security functionality or P2PE Requirements
Elements of the version number used for non-security-impacting changes must never be used for security-impacting changes.
If the P2PE Application Vendor uses a versioning scheme that involves mapping of internal version numbers to external, published version
numbers, all security-impacting changes must result in an update to the external, published version number.
Any version number that is accessible to customers and integrator/resellers must be consistent with the versioning methodology described in the
P2PE Application Implementation Guide.
P2PE Application Vendors must ensure traceability between application changes and version numbers such that a customer or
integrator/reseller may determine which changes are included in the specific version of the application they are running.
H.3 Wildcards
A “wildcard” element is a variable character that may be substituted for a defined subset of possible characters in an application versioning
scheme. In the context of P2PE Applications, wildcards can optionally be used to represent non-security-impacting changes between each
version represented by the wildcard element. A wildcard is the only variable element of the P2PE Application Vendor’s version scheme. Use of a
wildcard element in the versioning scheme is optional and is not required in order for the P2PE Application to be Accepted and Listed. The use
of wildcard elements is permitted subject to the following:
a) Wildcard elements may only be used for No Impact changes, which have no impact on security and/or any P2PE requirements.
b) The use of wildcard elements is limited to the rightmost (least significant) portion of the version number. For example, 1.1.x
represents acceptable usage. A version methodology that includes a wildcard element followed by a non-wildcard element is not
permitted. For example, 1.x.1 and 1.1.y.1 represent usage that is not permitted.
c) All security-impacting changes must result in a change to the non-wildcard portion of the application version number and will
therefore result in an update to the version number listed on the Website.
d) Wildcard elements must not precede version elements that could represent security-impacting changes; version elements reflecting
a security-impacting change must appear “to the left of” the first wildcard element.
e) All wildcard usage must be pre-defined and documented in the P2PE Application Vendor’s versioning methodology and the P2PE
Application Implementation Guide.
f) All wildcard usage must be consistent with that validated by the P2PE Assessor Company as part of the P2PE Assessment of the
P2PE Application.
PCI P2PE® Program Guide v3.0 revision 1.0, Appendix H December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 74
Appendix I: P2PE Applicability of Requirements
The following matrix indicates with an “x” all P2PE Security Requirements that apply to P2PE Solutions
(including Merchant-Managed Solutions), P2PE Applications, and P2PE Components.
Note: Each requirement denoted includes all sub-requirements unless indicated otherwise.
Notes for the P2PE Requirement Applicability Matrix:
1 - Where a Solution Provider (or a Merchant as a Solution Provider in a Merchant-Managed Solution -
MMS) is using a Listed P2PE Component Provider, the Solution Provider is not required to have the
requirements applicable to that Listed P2PE Component assessed as part of their P2PE Solution
assessment. E.g., if a Solution Provider outsources to a Listed P2PE Encryption Management
Component Provider, the Solution Provider is not required to assess to any of the requirements denoted
below for Encryption Management. Note that neither a Solution Provider or a Merchant-Managed Solution
Provider are permitted to outsource any requirements in Domain 3 (and additionally Appendix A for
MMS). However, for any key management services requirements (Domain 5) not otherwise included as
part of the assessment for included Listed P2PE Component Providers, the Solution Provider is
responsible for including all applicable key management services requirements in the scope of their
assessment.
E.g., if the P2PE Solution offers remote key-distribution using asymmetric techniques for the distribution
of keys to PCI-approved POI devices for use in connection with account-data encryption, or the operation
of an applicable CA/RA, or any other relevant key management service that has not already been
assessed as part of the inclusion of a Listed P2PE Component Provider, then the P2PE Solution
assessment must include all applicable key management services requirements (Domain 5).
2 - Where an Encryption Management Component Provider is using a Listed P2PE POI Deployment or
Listed POI Management Component Provider, the Encryption Management Component Provider is not
required to have the requirements applicable to that POI Deployment or POI Management Component
Provider, as applicable, assessed as part of their Encryption Management Component Provider
assessment.
3 - Where a Key Injection Facility (KIF) Component Provider is using a Listed P2PE Key Loading or
Listed Key Management Component Provider, the KIF Component Provider is not required to have the
requirements applicable to the Key Loading or Key Management Component Provider, as applicable,
assessed as part of their KIF Component Provider assessment.
4 - The “Remote Key” requirements are additional requirements that apply to any entity implementing
remote key distribution using asymmetric techniques for the distribution of keys to PCI-approved POI
devices for use in connection with account-data encryption. Note that these requirements are additional
requirements that must be met – i.e., they cannot be assessed in isolation – they must be assessed in
addition to all applicable Domain 5 requirements relevant to the assessment. Refer to Domain 5 in the
P2PE Standard for more information.
5 - These requirements apply only to entities operating Certification and/or Registration Authorities. Refer
to Domain 5 in the P2PE Standard for more information.
6 - Merchant-Managed Solutions are not permitted to utilize a hybrid decryption environment unless they
are using a Listed P2PE Decryption Management Component Provider that employs hybrid decryption.
PCI P2PE Program Guide v3.0 revision 1.0, Appendix I December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 75
P2PE Security Requirements
Decryption
Encryption Management Services Management Key Management Services
P2PE P2PE Services Solution
Requirement Application (or MMS) 1,4,6
POI POI Encryption Decryption Key Key Remote
KIF3,4 CA/RA5
Deployment4 Management4 Management2,4 Management4 Management4 Loading4 Key4
Domain 1
1A-1 X X X
1A-2 X X X
1B-1.1 X X X
1B1.2 X X X
1B-2 X X X
1B-3 X X X
1B-4 X X X
1B-5 X X X
1C-1 X X X
1C-2 X X X X
1D-1 X X X
1D-2 X X X X
Note: 1E-1 is only applicable to Encryption Management Services Component Providers (EMCP, PDCP, PMCP)
1E-1 X X X
Domain 2
2A-1 X
2A-2 X
2A-3 X
2B-1 X
2B-2 X
2B-3 X
2B-4 X
2C-1 X
PCI P2PE Program Guide v3.0 revision 1.0, Appendix I December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 76
P2PE Security Requirements
Decryption
Encryption Management Services Management Key Management Services
P2PE P2PE Services Solution
Requirement Application (or MMS) 1,4,6
POI POI Encryption Decryption Key Key Remote
KIF3,4 CA/RA5
Deployment4 Management4 Management2,4 Management4 Management4 Loading4 Key4
Domain 2 (continued)
2C-2 X
2C-3 X
Domain 3
3A-1 X
3A-2 X
3A-3 X
3A-4 X
3B-1 X
3C-1 X
Domain 4
4A-1 X X
4B-1 X X
4C-1 X X
Note: If a hybrid decryption environment is being used, the following requirements (4D) will apply
4D-1 X X
4D-2 X X
4D-3 X X
4D-4 X X
Note: 4E-1 is only applicable to Decryption Management Services Component Providers (DMCP)
4E-1 X
Domain 5
1-1 Note: Not used in P2PE
1-2 X X
1-3 X X X X X X X X X
PCI P2PE Program Guide v3.0 revision 1.0, Appendix I December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 77
P2PE Security Requirements
Decryption
Encryption Management Services Management Key Management Services
P2PE P2PE Services Solution
Requirement Application (or MMS) 1,4,6
POI POI Encryption Decryption Key Key Remote
KIF3,4 CA/RA5
Deployment4 Management4 Management2,4 Management4 Management4 Loading4 Key4
Domain 5 (continued)
1-4 X X X X X X X X X
1-5 X X X
Note: PIN Requirements 2, 3, and 4 are all PIN-specific and are therefore omitted from P2PE
5-1 X X X X X X X X
6-1 X X X X X X X X
6-2 X X X X X X X X
6-3 X X X X X X X X
6-4 X X X X X X X X
6-5 X X X X X X X X
6-6 X X X X X X X X
7-1 X X X X X X X X
7-2 X X X X X X X X
8-1 X X X X X X X X X
8-2 X X X X X X X X X
8-3 X X X X X X X X X
8-4 X X X X X X X X X
9-1 X X X X X X X X
9-2 X X X X X X X X
9-3 X X X X X X X X
9-4 X X X X X X X X
9-5 X X X X X X X X
9-6 X X X X X X X X
10-1 X X X X X X X X
PCI P2PE Program Guide v3.0 revision 1.0, Appendix I December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 78
P2PE Security Requirements
Decryption
Encryption Management Services Management Key Management Services
P2PE P2PE Services Solution
Requirement Application (or MMS) 1,4,6
POI POI Encryption Decryption Key Key Remote
KIF3,4 CA/RA5
Deployment4 Management4 Management2,4 Management4 Management4 Loading4 Key4
Domain 5 (continued)
10-2
10-3
Note: Not used in P2PE
10-4
10-5
11-1 X X X X X X X X X
11-2 X X X X X X X X
12-1 X X X X X X X X
12-2 X X X X X X X X
12-3 X X X X X X X X
12-4 X X X X X X X X
12-5 X X X X X X X X
12-6 X X X X X X X X
12-7 X X X X X X X
12-8 X X X X X X X
12-9 X X
13-1 X X X X X X X X
13-2 X X X X X X X X
13-3 X X X X X X X X
13-4 X X X X X X X X
13-5 X X X X X X X X
13-6 X X X X X X X X
13-7 X X X X X X X X
13-8 X X X X X X X X
13-9 X X
PCI P2PE Program Guide v3.0 revision 1.0, Appendix I December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 79
P2PE Security Requirements
Decryption
Encryption Management Services Management Key Management Services
P2PE P2PE Services Solution
Requirement Application (or MMS) 1,4,6
POI POI Encryption Decryption Key Key Remote
KIF3,4 CA/RA5
Deployment4 Management4 Management2,4 Management4 Management4 Loading4 Key4
Domain 5 (continued)
14-1 X X X X X X X X
14-2 X X X X X X X X
14-3 X X X X X X X X
14-4 X X X X X X X X
14-5 X X X X X X X X
15-1 X X X X X X X X
15-2 X X X X X X X X
15-3 X
15-4 X
15-5 X X
16-1 X X X X X X X X
16-2 X X X X X X X X
17-1 X X X X X
18-1 X X X X X
18-2 X X X X X X X X X
18-3 X X X X X X X
18-4 X
18-5 X
18-6 X X
18-7 X X
19-1 X X X X X X X X
19-2 X X X X X X X X
19-3 X X X X X X X X
19-4 X X X X X X X X
PCI P2PE Program Guide v3.0 revision 1.0, Appendix I December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 80
P2PE Security Requirements
Decryption
Encryption Management Services Management Key Management Services
P2PE P2PE Services Solution
Requirement Application (or MMS) 1,4,6
POI POI Encryption Decryption Key Key Remote
KIF3,4 CA/RA5
Deployment4 Management4 Management2,4 Management4 Management4 Loading4 Key4
Domain 5 (continued)
19-5 X X X X X X X X
19-6 X X
19-7 X
19-8 X
19-9 X
19-10 X
19-11 X
19-12 X
20-1 X X X X X X X X
20-2 X X X X X X X X
20-3 X X X X X X X X
20-4 X X X X X X X X
20-5 X X
20-6 X X
21-1 X X X X X X X X X
21-2 X X X X X X X X X
21-3 X X X X X X X X X
21-4 X X
22-1 X X X X X X X X X
22-2 X X X X X X X X X
22-3 X
22-4 X
22-5 X
23-1 X X X X X X X X X
PCI P2PE Program Guide v3.0 revision 1.0, Appendix I December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 81
P2PE Security Requirements
Decryption
Encryption Management Services Management Key Management Services
P2PE P2PE Services Solution
Requirement Application (or MMS) 1,4,6
POI POI Encryption Decryption Key Key Remote
KIF3,4 CA/RA5
Deployment4 Management4 Management2,4 Management4 Management4 Loading4 Key4
Domain 5 (continued)
23-2 X X X X X X X X X
23-3 X X X X X X X X X
24-1 X X X X X X X X X
24-2 X X X X X X X X X
25-1 X X X X X X X X X
25-2 X
25-3 X
25-4 X
25-5 X
25-6 X
25-7 X
25-8 X
25-9 X
26-1 X X X X X X X X X
27-1 X X X X X X X X X
27-2 X X X X X X X X X
28-1 X X X X X X X X X
28-2 X
28-3 X
28-4 X
28-5 X
29-1 X X X X X X X X
29-2 X X X
29-3 X X X X X X X X
PCI P2PE Program Guide v3.0 revision 1.0, Appendix I December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 82
P2PE Security Requirements
Decryption
Encryption Management Services Management Key Management Services
P2PE P2PE Services Solution
Requirement Application (or MMS) 1,4,6
POI POI Encryption Decryption Key Key Remote
KIF3,4 CA/RA5
Deployment4 Management4 Management2,4 Management4 Management4 Loading4 Key4
Domain 5 (continued)
29-4 X X X X X X X X X
29-5 X X X X X X X X X
30-1
Note: Not used in P2PE
30-2
30-3 X X
31-1 X X X X X X X X X
32-1 X X X X X X X X
32-2 X
32-3 X
32-4 X
32-5 X
32-6 X
32-7 X
32-8
X X X
(8.1, 8.2)
32-8
X X
(8.3 − 8.7)
32-9 X X
33-1 X X X X X X X X
5A-1 X X X X X X X X
Note: If a hybrid decryption environment is being used, the following additional requirements (5H) will apply
5H-1 X X
Note: 5I-1 is only applicable to Key Management Services Component Providers
5I-1 X X X X X
PCI P2PE Program Guide v3.0 revision 1.0, Appendix I December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 83
P2PE Security Requirements
Decryption
Encryption Management Services Management Key Management Services
P2PE P2PE Services Solution
Requirement Application (or MMS) 1,4,6
POI POI Encryption Decryption Key Key Remote
KIF3,4 CA/RA5
Deployment4 Management4 Management2,4 Management4 Management4 Loading4 Key4
APPENDIX A
Note: Appendix A is only applicable to Merchant-Managed Solutions (MMS)
MM-A-1 X
MM-A-2 X
MM-B-1 X
MM-C-1 X
PCI P2PE Program Guide v3.0 revision 1.0, Appendix I December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 84
Appendix J: PCI-Approved HSM Expiry Flowchart
PCI P2PE Program Guide v3.0 revision 1.0, Appendix J December 2020
Copyright 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page 85