Using SAP NetWeaver PI in PCI-Compliant Scenarios 
This sections provides information on using SAP NetWeaver PI to implement scenarios that comply with the Payment Card Industry Data Security Standard (PCI-DSS, shortly referred to as PCI) as documented under http://www.pcisecuritystandards.org.
SAP NetWeaver PI allows you to encrypt the payload and attachments of messages (shortly referred to as message content) on data base level, which means: to store message content encrypted.
More information:Encrypting Message Content on Database Level
SAP NetWeaver PI provides the technical capabilities to comply with the PCI standard. However in the current, first implementation of the standard, the requirements are not always met in the most convenient way. For example, missing capabilities to mask of Primary Account Number (see table below) needs to be compensated by preventing payload display.
The following table lists in how far several requirements of the PCI standard are met by the PI encryption capabilities and which limitations exist with regard to the standard:
PCI Requirement — Short Description |
PCI Requirement |
SAP NetWeaver PI Approach and Limitations |
Mask Primary Account Number (PAN) when displayed. |
3.3 “Mask PAN when displayed (the first six and last four digits are the maximum number of digits to be displayed).” “This requirement does not apply to employees and other parties with a legitimate business need to see the full PAN. ” “This requirement does not supersede stricter requirements in place for displays of cardholder data—for example, for point-of-sale (POS) receipts.” |
PI customers are advised to prevent payload monitoring for payment scenarios, as it is common practice for scenario that involve exchange of sensitive data. Payload monitoring can be restricted by applying special authorizations. More information:
|
Store PAN always encrypted. |
3.4 “Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs) by using any of the following approaches:”
|
When you activate message encryption on database level, the entire payload containing the PAN (and any attachments) is stored encrypted. However, PI components access the message in clear text (for example, in monitoring). |
Allow to retire or replace encryption key in case the integrity of the key has been weakened. |
3.6.5 “Retirement or replacement (for example, archiving, destruction, and/or revocation) of keys as deemed necessary when the integrity of the key has been weakened (for example, departure of an employee with knowledge of a clear-text key), or keys are suspected of being compromised.” |
In case a key has been compromised, the administrator can find out if the key is still in use for message encryption.
Based on the result of this evaluation, the administrator has to either cancel or deliver messages that are still stored encrypted with the compromised key. |
Log all individual access to PAN. |
10.2 “Implement automated audit trails for all system components to reconstruct the following events:” “10.2.1 All individual accesses to cardholder data” |
All access to message content is logged in the security audit log of the underlying Application Server. More information: |
Note
The numbers and quotations in column PCI Requirement refer to the specification of the PCI standard at http://www.pcisecuritystandards.org.