Project No.ISO 11568:2023
Title<p class="MsoBodyText"><span lang="EN-GB">This document describes the management of symmetric and asymmetric cryptographic keys that can be used to protect sensitive information in financial services related to retail payments. The document covers all aspects of retail financial services, including connections between a card-accepting device and an Acquirer, between an Acquirer and a card Issuer, and between an ICC and a card-accepting device. It covers all phases of the key life cycle, including the generation, distribution, utilization, archiving, replacement and destruction of the keying material. This document covers manual and automated management of keying material, and any combination thereof, used for retail financial services. It includes guidance and requirements related to key separation, substitution prevention, identification, synchronization, integrity, confidentiality and compromise, as well as logging and auditing of key management events.</span></p> <p class="MsoBodyText"><span lang="EN-GB">Requirements associated with hardware used to manage keys have also been included in this document.</span></p>
Registration number (WIID)73993
Scope<p class="MsoBodyText"><span lang="EN-GB">This document describes the management of symmetric and asymmetric cryptographic keys that can be used to protect sensitive information in financial services related to retail payments. The document covers all aspects of retail financial services, including connections between a card-accepting device and an Acquirer, between an Acquirer and a card Issuer, and between an ICC and a card-accepting device. It covers all phases of the key life cycle, including the generation, distribution, utilization, archiving, replacement and destruction of the keying material. This document covers manual and automated management of keying material, and any combination thereof, used for retail financial services. It includes guidance and requirements related to key separation, substitution prevention, identification, synchronization, integrity, confidentiality and compromise, as well as logging and auditing of key management events.</span></p> <p class="MsoBodyText"><span lang="EN-GB">Requirements associated with hardware used to manage keys have also been included in this document.</span></p>
StatusStandarts spēkā
ICS group35.240.40