Move/3500 PCI PTS Security Policy
Ingenico document - Please check document validity before using
7_System Administration
7_1 Configuration Settings
The device is functional when received by the merchant or acquirer. No security sensitive
configuration settings are necessary to be tuned by the end user to meet security requirements.
7_2 Default Value Update
The device is functional when received by the merchant or acquirer and there is no security sensitive
default value (e.g. admin password) that needs to be changed before operating the device.
8_Key Management
8_1 Key Management Techniques
The device implements different types of key management techniques:
•
Fixed Key: a key management technique based on a unique key for each terminal as specified
in [2].
•
Master Key/ Session Key: a method using a hierarchy of keys. The session keys are unique
per transaction as specified in [2].
•
DUKPT: a key management technique based on a unique key for each transaction as
specified in [3].
8_2 Cryptographic Algorithms
The device includes the following algorithms:
•
Triple DES (112 bits, 168 bits)
•
AES (128, 192 and 256 bits)
•
RSA (2048 bits)
•
ECDSA (256, 384, 521 bits)
•
SHA-256, SHA-384, SHA-512