P2PE Program Guide V2.0

P2PE_Program_Guide_v2.0

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 71

DownloadP2PE Program Guide V2.0
Open PDF In BrowserView PDF
Payment Card Industry (PCI)

Point-to-Point Encryption (P2PE)

Program Guide
Version 2.0
September 2015

Document Changes
Date

Version

Description

June 2012

1.0

Initial Release of the PCI P2PE Program Guide

February 2013

1.1

Updated to reflect changes to Domain 2 assessments and changes to
the evolving P2PE Program.

September 2015

2.0

Align to v2.0 of the P2PE Standard.

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page i

Table of Contents
1 Introduction ............................................................................................................................................ 4
1.1 Program Background...................................................................................................................... 4
1.2 Related Publications ....................................................................................................................... 5
1.3 Updates to Documents and Security Requirements ...................................................................... 6
1.4 Terminology .................................................................................................................................... 6
1.5 About the P2PE Standard ............................................................................................................ 11
1.6 P2PE Initiative and Overview ....................................................................................................... 13
2 Roles and Responsibilities ................................................................................................................. 14
2.1 P2PE Vendors .............................................................................................................................. 14
2.2 Participating Payment Brands ...................................................................................................... 16
2.3 PCI Security Standards Council ................................................................................................... 16
2.4 P2PE Assessor Companies ......................................................................................................... 17
2.5 Integrators and Resellers ............................................................................................................. 18
2.6 Qualified Integrators and Resellers (QIRs) .................................................................................. 18
2.7 Customers .................................................................................................................................... 18
2.8 PCI-Recognized Laboratories ...................................................................................................... 19
2.9 Payment Device (Hardware) Vendors .......................................................................................... 19
3 Overview of Validation Processes...................................................................................................... 20
3.1 Validation Processes for P2PE Solutions, P2PE Components, and P2PE Applications to be
listed on the Website .................................................................................................................... 20
3.2 Overview of Validation Processes for Merchant-managed Solutions .......................................... 25
4 Preparation for the Review .................................................................................................................. 26
4.1 Considerations for Secure Cryptographic Devices (SCDs), Vendors of P2PE Applications and
Non-payment Software, and Providers of P2PE Components for use in P2PE Solutions .......... 26
4.2 Prior to the Review ....................................................................................................................... 29
4.3 Required Documentation and Materials ....................................................................................... 29
4.4 P2PE Review Timeframes ........................................................................................................... 29
4.5 P2PE Assessors ........................................................................................................................... 30
4.6 Technical Support throughout Testing ......................................................................................... 31
4.7 Vendor Release Agreement (VRA) .............................................................................................. 31
4.8 The Portal ..................................................................................................................................... 32
4.9 P2PE Acceptance Fees ............................................................................................................... 32
5 Managing a Validated P2PE Listing ................................................................................................... 33
5.1 Annual Revalidation...................................................................................................................... 33
5.2 Changes to P2PE Listings ............................................................................................................ 34
5.3 Change Documentation ................................................................................................................ 40
5.4 Renewing Expiring Listings .......................................................................................................... 41
5.5 Validation Maintenance Fees ....................................................................................................... 41
5.6 Notification Following a Security Breach, Compromise, or Known or Suspected Vulnerability ... 41
6 P2PE Assessor Reporting Considerations ....................................................................................... 43
6.1 P-ROV Acceptance Process Overview ........................................................................................ 43
6.2 Delivery of the P-ROV and Related Materials .............................................................................. 44
6.3 Assessor Quality Management Program ..................................................................................... 44
PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page ii

Appendix A: P2PE Products and Acceptance ..................................................................................... 47
Appendix B: Elements for the List of Validated P2PE Solutions ....................................................... 48
Appendix C: Elements for the List of Validated P2PE Components ................................................. 50
Appendix D: Elements for the List of Validated P2PE Applications.................................................. 53
Appendix E: Change Impact Template for P2PE Solutions ............................................................... 55
Appendix F: Change Impact Template for P2PE Components .......................................................... 60
Appendix G: Change Impact Template for P2PE Applications .......................................................... 65
Appendix H: P2PE Application Software Versioning Methodology .................................................. 69
H.1 Version Number Format ............................................................................................................... 69
H.2 Version Number Usage ................................................................................................................ 69
H.3 Wildcards ...................................................................................................................................... 70

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page iii

1 Introduction
This document provides an overview of the PCI SSC Point-to-Point Encryption Standard program (“P2PE
Program” or “Program”) operated and managed by the PCI Security Standards Council, LLC (“PCI SSC”),
and should be read in conjunction with the P2PE Qualification Requirements as well as those documents
referenced in Section 1.2, “Related Publications,” below. This Program Guide describes the following:


Program Background (Section 1.1)



P2PE Initiative and Overview (Section 1.4)



Program Roles and Responsibilities (Section 2)



Overview of the Validation Process (Section 3)



Preparation for the Review (Section 4)



Managing a Validated P2PE Listing (Section 5)



Reporting Considerations (Section 6)



Assessor Quality Management Program (Section 6.3)

1.1 Program Background
In response to requests from merchants and other members of the Payment Card Industry (PCI) for a
unified set of point-to-point encryption security requirements, PCI SSC has adopted and maintains the
Point-to-Point Encryption Standard (P2PE), the current version of which is available on the PCI SSC
Website. When implemented appropriately, a P2PE Solution provides a rigorous defense against data
exposure and compromise.
PCI SSC manages the Program, including the development, implementation, and maintenance of
validated P2PE Products (P2PE Application, P2PE Component, or P2PE Solution).
Organizations qualified by PCI SSC to validate P2PE Solutions and P2PE Components on behalf of
P2PE Vendors are referred to as Qualified Security Assessor P2PE Companies (QSA (P2PE)
Companies), further described below. Organizations qualified by PCI SSC to validate P2PE
Applications on behalf of Vendors are referred to as Payment Application Qualified Security Assessor
P2PE Companies (PA-QSA (P2PE) Companies), further described below. The quality, reliability, and
consistency of a QSA (P2PE) Company and/or PA-QSA (P2PE) Company’s work provide confidence
that the P2PE Solution, P2PE Component, and/or P2PE Application has been validated for P2PE
compliance in accordance with the PCI P2PE Program.

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 4

1.2

Related Publications

The P2PE Program Guide should be used in conjunction with the latest versions of (or successor
documents to) the following PCI SSC publications, each as available through the Website:
Document name

Description

Payment Card Industry (PCI) Point-to-Point
Encryption Glossary of Terms,
Abbreviations, and Acronyms (the “P2PE
Glossary”)

Separate glossary for specific use with the P2PE
Standard.

PCI Point-to-Point Encryption Solution
Requirements and Testing Procedures
(“P2PE Standard”)

The P2PE Standard lists and defines the specific
technical requirements and assessment procedures.

PCI P2PE Report on Validation Reporting
Template (“P-ROV Reporting Template”)

The P-ROV Reporting Template is mandatory for
completing a P2PE Report on Validation and
includes detail on how to document the findings of a
P2PE Assessment. There are several versions
covering P2PE Solutions, P2PE Components, and
P2PE Applications.

PCI P2PE Attestation of Validation (“PAOV”)

The P-AOV is a form for QSA (P2PE) and/or PAQSA (P2PE) Companies to attest to the results of a
P2PE Assessment, as documented in the P2PE
Report on Validation. There are several versions
covering P2PE Solutions, P2PE Components, and
P2PE Applications.

PCI Qualification Requirements for Point-toPoint Encryption (P2PE) Qualified Security
Assessors, QSA (P2PE) and PA-QSA
(P2PE) (or “P2PE Qualification
Requirements”)

The P2PE Qualification Requirements are a baseline
set of requirements that must be met by a QSA
(P2PE) and/or PA-QSA (P2PE) Company and QSA
(P2PE) and/or PA-QSA (P2PE) Employees in order
to perform P2PE Assessments.

Vendor Release Agreement (“VRA”)

The VRA establishes the terms and conditions under
which validated P2PE Solutions, P2PE Components,
and P2PE Applications are accepted and listed by
PCI SSC.

The most current versions of the following additional documents are used in conjunction with the
aforementioned:



Payment Card Industry (PCI) Data Security Standard Requirements and Security Assessment
Procedures (PCI DSS)
Payment Card Industry (PCI) Payment Application Data Security Standard Requirements and
Security Assessment Procedures (PA-DSS)



Payment Card Industry (PCI) PIN Security Requirements



Payment Card Industry (PCI) PTS Hardware Security Module (HSM) Security Requirements



Payment Card Industry (PCI) PTS POI Modular Security Requirements



Payment Card Industry (PCI) PTS Device Testing and Approval Program Guide

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 5



Payment Card Industry (PCI) Data Security Standard and Payment Application Data Security
Standard Glossary of Terms, Abbreviations, and Acronyms (the “Glossary”)

1.3 Updates to Documents and Security Requirements
It is necessary to regularly review, update, and improve the security requirements used to evaluate
P2PE Solutions, P2PE Components, and P2PE Applications. PCI SSC provides interim updates to the
PCI community through a variety of means including required training, e-mail bulletins, frequently asked
questions (which may include technical/normative FAQs), and others.
PCI SSC reserves the right to change, amend, or withdraw security requirements at any time. If such a
change is required, PCI SSC will endeavor to work closely with PCI SSC’s community of Participating
Organizations, P2PE Solution Providers, P2PE Component Providers, P2PE Application Providers, and
P2PE Assessor Companies to help minimize the impact of any changes.

1.4 Terminology
Throughout this document the following terms have the meanings shown in the chart below.
Term
Accepted, or listed

Meaning
A P2PE Product is deemed to have been “Accepted” or “listed” (and
“Acceptance” is deemed to have occurred) when PCI SSC has:
(i) received the corresponding P-ROV from the P2PE Assessor
Company;
(ii) received the corresponding fee and all documentation required
with respect to that P2PE Product as part of the Program;
(iii) confirmed that the P-ROV is correct as to form (all applicable
documents completed appropriately/sufficiently), the P2PE Assessor
Company properly determined that the P2PE Solution, P2PE
Component, or P2PE Application is eligible to be a P2PE Validated
Solution, a P2PE Validated Component, or a P2PE Validated
Application, the P2PE Assessor Company adequately reported the
P2PE compliance of the P2PE Solution, P2PE Component, or P2PE
Application in accordance with Program requirements, and the detail
provided in the P-ROV meets PCI SSC’s reporting requirements; and
(iv) listed the P2PE Solution, P2PE Component, or P2PE Application
on the List of Validated P2PE Solutions, List of Validated P2PE
Components, or List of Validated P2PE Applications; provided that
PCI SSC may suspend, withdraw, revoke, cancel, or place conditions
upon (including without limitation, complying with remediation
requirements) Acceptance of any P2PE Solution, P2PE Component,
or P2PE Application in accordance with applicable P2PE Program
procedures.

Application P-ROV

P-ROV covering a P2PE Application Assessment relating to a P2PE
Application.

Component P-ROV

P-ROV covering a P2PE Component Assessment relating to a P2PE
Component.

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 6

Term

Meaning

Delta Assessment

Partial P2PE Assessment performed against applicable P2PE
Requirements when changes to a listed P2PE Application are eligible
for review under the “Delta Assessment” change-review process
described herein.

List of Validated P2PE
Applications

The Council’s authoritative List of Validated P2PE Applications
appearing on the PCI SSC website.

List of Validated P2PE
Components

The Council’s authoritative List of Validated P2PE Components
appearing on the PCI SSC website.

List of Validated P2PE
Solutions

The Council’s authoritative List of Validated P2PE Solutions
appearing on the PCI SSC website.

Listing

Refers to the listing and related information regarding a P2PE
Solution on the List of Validated P2PE Solutions, a P2PE Component
on the List of Validated P2PE Components, or a P2PE Application on
the List of Validated P2PE Applications.

Merchant-managed
Solution (or MMS)

A P2PE solution managed by a merchant rather than by a ThirdParty Solution Provider. These merchant solutions are typically for
large retail organizations who centrally manage the solution on
behalf of their own encryption environments.
In a merchant-managed solution, part of the merchant business
plays the role of a P2PE solution provider (managing POIs,
decryption environment, etc.), and part of the business plays the
role of a “merchant” that has no access to clear-text account data,
etc.
Merchant-managed solutions are not eligible for PCI listing.

P-AOV

A P2PE Program “Attestation of Validation” declaring the P2PE
Solution, P2PE Component, or P2PE Application’s validation status
against the P2PE Standard.






P-ROV

The P2PE Solution AOV, signed by a QSA (P2PE) Company and
the P2PE Solution Provider, is used when validating, revalidating,
or submitting changes to a P2PE Solution.
The P2PE Component AOV, signed by a QSA (P2PE) Company
and the P2PE Component Provider, is used when validating,
revalidating, or submitting changes to a P2PE Component.
The P2PE Application AOV, signed by a PA-QSA (P2PE)
Company and the P2PE Application Vendor, is used when
validating, revalidating, or submitting changes to a P2PE
Application.

A “P2PE Report on Validation” completed by a P2PE Assessor
Company and (except with respect to Merchant-managed Solutions)
submitted directly to PCI SSC for review and Acceptance (defined in
the P2PE Program Guide). For a P2PE Solution, P2PE Component,
or P2PE Application to be included on the corresponding list of
validated solutions, components, or applications on the Website, a
corresponding P-ROV must be submitted directly to PCI SSC for
review and Acceptance.

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 7

Term

Meaning

P-ROV (MMS)

A “P2PE Report on Validation” completed by a P2PE Assessor
Company for a Merchant-managed Solution.

P2PE Application

Refer to definition in P2PE Glossary.

P2PE Application
Assessment

Assessment of a P2PE Application against P2PE Domain 2 in
isolation of any point-to-point solution in order to validate compliance
with the P2PE Standard as part of the P2PE Program.

P2PE Application Vendor

Refer to definition in P2PE Glossary.

P2PE Assessment

A P2PE Solution Assessment, P2PE Component Assessment, or
P2PE Application Assessment.

P2PE Assessor Company

A company qualified by PCI SSC as either a QSA (P2PE) Company
or PA-QSA (P2PE) Company.

P2PE Assessor Employee

A QSA (P2PE) Employee or PA-QSA (P2PE) Employee.

P2PE Components

A P2PE service (such as encryption management, decryption
management, or key injection) that is eligible for validation and
Acceptance on a standalone basis as part of the P2PE Program and
may be incorporated into and/or referenced as part of a P2PE
Solution.

P2PE Component
Assessment

Assessment of a P2PE Component against applicable P2PE
Domains in order to validate compliance with the P2PE Standard as
part of the P2PE Program.

P2PE Component Provider

Refer to definition in P2PE Glossary.

P2PE Domain or Domain

Any of the six control domains of the P2PE Standard, which together
represent the core areas where security controls may need to be
applied and validated.

P2PE Glossary

Refers to the then-current version of (or successor document to) the
PCI Point-to-Point Encryption Glossary of Terms, Abbreviations, and
Acronyms, as from time to time amended and made available on the
Website.

P2PE Instruction Manual or
“PIM”

An instruction manual prepared by a P2PE Solution Provider in
accordance with the P2PE Standard to instruct its customers and
resellers/integrators on secure P2PE Solution implementation, to
document secure configuration specifics, and to clearly delineate
vendor, reseller/integrator, and customer responsibilities for installing
and/or using P2PE Solutions.

P2PE Non-payment
Software

Refer to definition in P2PE Glossary.

P2PE Product

A P2PE Application, P2PE Component, or P2PE Solution

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 8

Term

Meaning

P2PE Program (or
Program)

Refers to PCI SSC's program and requirements for qualification of
QSA (P2PE) Companies and QSA (P2PE) Employees and PA-QSA
(P2PE) Companies and PA-QSA (P2PE) Employees, and validation
and Acceptance of P2PE Solutions, P2PE Components, and P2PE
Applications, as further described in this document and related PCI
SSC documents, policies, and procedures.

P2PE Program Guide

The then-current version of (or successor documents to) this
document—the Payment Card Industry (PCI) Point-to-Point
Encryption P2PE Program Guide, as from time to time amended and
made available on the Website.

P2PE Solution

A combination of secure devices, applications, and processes that
encrypt cardholder data from a PCI SSC-approved point-ofinteraction (POI) device through to decryption and that is eligible for
validation and Acceptance as part of the P2PE Program.

P2PE Solution Assessment

Assessment of a P2PE Solution against applicable P2PE Domains in
order to validate compliance with the P2PE Standard as part of the
P2PE Program.

P2PE Solution Provider

Refer to definition in P2PE Glossary.

P2PE Standard

The then-current version of (or successor document(s) to) the
Payment Card Industry (PCI) Point-to-Point Encryption Solution
Requirements and Testing Procedures, any and all appendices,
exhibits, schedules, and attachments to the foregoing and all
materials incorporated therein, in each case, as from time to time
amended and made available on the Website.

P2PE Vendor

A P2PE Solution Provider, or
P2PE Component Provider, or
P2PE Application Vendor.

PA-QSA (P2PE) Company

A Payment Application Qualified Security Assessor (PA-QSA)
Company that:
(a) Is qualified by PCI SSC to provide services to P2PE Solution
Providers, P2PE Component Providers, and/or P2PE Application
Vendors in order to validate that such providers’ or vendors’
P2PE Solutions, P2PE Components, and/or P2PE Applications
adhere to all aspects of the P2PE Standard, including but not
limited to, validation that payment applications, when
incorporated into or used as part of a P2PE Solution, adhere to
all P2PE Domain 2 requirements; and
(b) Remains in Good Standing (defined in Section 1.3 of the P2PE
Qualification Requirements) or in remediation as a PA-QSA
(P2PE) Company.

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 9

Term

Meaning

PA-QSA (P2PE) Employee

An individual employed by a PA-QSA (P2PE) Company who has
satisfied, and continues to satisfy, all PA-QSA (P2PE) Requirements
(defined in the P2PE Qualification Requirements) applicable to
employees of PA-QSA (P2PE) Companies who will conduct P2PE
Application Assessments, as described in further detail herein.

Participating Payment
Brand

A global payment card brand or scheme that is also a limited liability
company member of PCI SSC (or affiliate thereof).

PCI SSC or the Council

Refers to the PCI Security Standards Council, LLC.

PCI-approved POI device

Refer to definition in P2PE Glossary.

QSA (P2PE) Company

A Qualified Security Assessor (QSA) Company that:
(a) Is qualified by PCI SSC to provide services to P2PE Solution
Providers and/or P2PE Component Providers in order to validate
that such providers’ P2PE Solutions and/or P2PE Components
adhere to all applicable aspects of the P2PE Standard, and
(b) Remains in Good Standing (defined in Section 1.3 of the P2PE
Qualification Requirements) or in remediation as a QSA (P2PE)
Company.
QSA (P2PE) Company qualification, alone, does not qualify a
company to conduct P2PE Application Assessments. P2PE
Application Assessments may only be performed by PA-QSA (P2PE)
Companies.

QSA (P2PE) Employee

An individual employed by a QSA (P2PE) who has satisfied, and
continues to satisfy, all QSA (P2PE) Requirements applicable to
employees of QSA (P2PE) Companies who will conduct P2PE
Solution Assessments and/or P2PE Component Assessments, as
described in further detail herein.

Secure Cryptographic
Device (SCD)

Refer to definition in P2PE Glossary.

Solution P-ROV

A P-ROV covering all applicable P2PE Domains relating to a P2PE
Solution.

Third-Party Service
Provider

An entity that provides a service or function on behalf of a P2PE
Solution Provider, which is incorporated into and/or referenced by the
applicable P2PE Solution, such as a payment gateway or data
center.
A Third-Party Service Provider is only considered a P2PE
Component Provider for eligible P2PE Component services if the
applicable service is separately PCI-listed on the List of Validated
P2PE Components. A Third-Party Service Provider that is not also a
PCI-listed P2PE Component Provider for those services must have
its services reviewed during the course of each of its solutionprovider customers’ P2PE Assessments.

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 10

Term

Meaning

Validated P2PE Application

A P2PE Application that has been assessed and validated by a PAQSA (P2PE) Company to be in scope for the P2PE Program and to
have met all P2PE Domain 2 Requirements and then Accepted by
PCI SSC, so long as such Acceptance has not been revoked,
suspended, withdrawn, or terminated.

Validated P2PE
Component

A P2PE Component that has been assessed and validated by a QSA
(P2PE) Company to be in scope for the P2PE Program and to have
met all necessary P2PE Requirements and then Accepted by PCI
SSC, so long as such Acceptance has not been revoked, suspended,
withdrawn, or terminated.

Validated P2PE Product

A Validated P2PE Application, Validated P2PE Component, or
Validated P2PE Solution

Validated P2PE Solution

A P2PE Solution that has been assessed by a QSA (P2PE)
Company or PA-QSA (P2PE) Company to be in scope for the P2PE
Program and to have met all of the requirements of the P2PE
Standard and then Accepted by PCI SSC, so long as such
Acceptance has not been revoked, suspended, withdrawn, or
terminated.

Vendor Release
Agreement (or VRA)

The then-current and applicable form of release agreement that PCI
SSC:
(a) Requires to be executed by P2PE Solution Providers, P2PE
Component Providers and/or P2PE Application Vendors (as
applicable) in connection with the P2PE Assessor Program, and
(b) Makes available on the Website.

Versioning Methodology

Refer to definition in P2PE Glossary.

Website

The then-current PCI SSC Website (and its accompanying web
pages), which is currently available at www.pcisecuritystandards.org.

Wildcard

Refer to definition in P2PE Glossary.

1.5 About the P2PE Standard
The P2PE Standard reflects a desire among constituents of the Payment Card Industry for a single,
standardized set of security requirements, security assessment procedures, and processes for
recognizing P2PE Products validated by P2PE Assessors. The P2PE Standard and related PCI SSC
standards define a common security assessment framework that is currently recognized by all
Participating Payment Brands.
Stakeholders in the payments value chain benefit from the P2PE Standard in a variety of ways,
including the following:


Customers benefit from a broader selection of validated P2PE Solutions, the possibility of
implementing Validated P2PE Solutions to reduce the scope of PCI DSS assessments, and
assurance from using P2PE Products validated by a QSA (P2PE) and/or PA-QSA (P2PE)
Companies to be P2PE Standard compliant.

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 11



P2PE Solution Providers benefit from a broader selection and recognition of P2PE Components and
P2PE Applications.



P2PE Solutions validated and listed by the Council are currently recognized by all Participating
Payment Brands.

Note: each brand independently develops and manages its own compliance programs and decisions
regarding recognition of P2PE Products.
For more information regarding PCI SSC, see the Website.

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 12

1.6 P2PE Initiative and Overview
This P2PE Program Guide reflects a single set of requirements currently recognized by each of the
Participating Payment Brands regarding:


P2PE security requirements and assessment procedures



Processes for recognizing P2PE Assessor-validated P2PE Solutions, P2PE Components, and
P2PE Applications



Quality assurance processes for P2PE Assessor Companies

P2PE Solution Providers may choose to have their P2PE Solutions validated for compliance with the
P2PE Standard in accordance with this P2PE Program Guide in order to have those solutions included
in the List of Validated P2PE Solutions on the PCI SSC website.
There are six control Domains for validation of P2PE Solutions. These Domains represent the core
areas where security controls need to be applied and validated in order for the P2PE Solution to be
listed on the PCI SSC website, as follows:
Domain Name

Description

Domain 1: Encryption Device and
Application Management

The secure management of the PCI-approved POI
devices and the resident software.

Domain 2: Application Security

The secure development of payment applications
designed to have access to clear-text account data
intended solely for installation on PCI-approved POI
devices.

Domain 3: P2PE Solution
Management

Overall management of the P2PE solution by the solution
provider, including third-party relationships, incident
response, and the P2PE Instruction Manual (PIM).

Domain 4: Merchant-managed
Solutions

Separate duties and functions between merchant
encryption and decryption environments.

Domain 5: Decryption Environment

The secure management of the environment that
receives encrypted account data and decrypts it.

Domain 6: P2PE Cryptographic Key
Operations and Device
Management

Establish and administer key-management operations for
account data encryption POI devices and decryption
HSMs.

Further information about these Domains is contained in the P2PE Standard.
Note: PCI SSC reserves the right to require revalidation due to changes to the P2PE
Standard and/or due to specifically identified vulnerabilities in listed P2PE Solutions.

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 13

2

Roles and Responsibilities

This section provides an overview of the roles and responsibilities of the various P2PE stakeholder
groups.

2.1 P2PE Vendors
P2PE Vendors (P2PE Solution Providers, P2PE Component Providers, and P2PE Application Vendors)
seeking Acceptance as part of the Program provide access to their P2PE Products and supporting
documentation to the P2PE Assessor Company for validation, and authorize their P2PE Assessor
Company to submit resulting P-ROVs and related information to PCI SSC.

2.1.1 P2PE Solution Providers
P2PE Solution Providers are entities (for example, processors, acquirers, or payment gateways)
that have overall responsibility for the design and implementation of specific P2PE Solutions, and
(directly or indirectly through outsourcing) manage P2PE Solutions for their customers and/or
manage corresponding responsibilities.
P2PE Solution Providers have overall responsibility for ensuring that their P2PE Solutions satisfy
all applicable requirements of the P2PE Standard.

2.1.2 P2PE Application (Software) Vendors
As part of establishing the P2PE compliance of its applications, an application vendor that
develops applications with access to clear-text account data on a POI device (i.e., P2PE
Applications) must have those applications assessed for secure operation within the applicable
POI devices, and must provide corresponding Implementation Guides that describe the secure
installation and administration of such applications on the corresponding POI devices.
Where a P2PE Application is to be used in a P2PE Solution, the vendor may optionally seek to
have that application validated and Accepted as a Validated P2PE Application, and accordingly
listed on the List of Validated P2PE Applications. P2PE Applications must be assessed by a PAQSA (P2PE) Company. For P2PE Applications intended for use in multiple P2PE Solutions,
validation and Acceptance as a Validated P2PE Application eliminates the need for the
application to be separately reviewed as part of each P2PE Solution in which is it used.

2.1.3 P2PE Component Providers
P2PE Component Providers provide any of the following component services that are assessed
and intended for listing by PCI SSC, and subsequently, for use in P2PE Solutions:


Encryption-management services – Assessed per Domains 1 and 6 including Annex A as
applicable.



Decryption-management services – Assessed per Domains 5 and 6 including Annex A as
applicable.



Key-Injection Facility services – Assessed per Annex B of Domain 6 including Annex A as
applicable.



Certification Authority/Registration Authority services – Assessed per Domain 6 Annex A,
Part A2, including Part A1 as applicable.

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 14

While an entity may provide more than one of the above component services, only component
services that have been validated by a P2PE Assessor and Accepted on a stand-alone basis by
PCI SSC are separately listed on the Website. “Stand-alone basis” here refers to the requirement
for each component service’s individual PCI SSC submission in the Portal—including the
corresponding P-AOV, P-ROV, and applicable fees—for each individual component service.
While each component service requires its own PCI SSC submission, the actual validation may
be part of a larger P2PE assessment and a separate assessment solely for the individual
component service may not be required.
If a component service described above is assessed as part of a P2PE Solution but is not on the
List of Validated P2PE Components, the entity is not considered a P2PE Component Provider for
purposes of that component and is simply referred to as a Third-Party Service Provider with
respect to that component. A Third-Party Service Provider must have its services reviewed during
the course of each of its solution provider customers’ P2PE Assessments.
All QSA (P2PE) Companies are qualified to assess P2PE Components for Listing on the List of
Validated P2PE Components.

2.1.3.1 Encryption-management Entity
An “Encryption-management Entity” is an entity that manages and deploys POI devices and
any resident P2PE applications and/or P2PE non-payment software. Specific requirements for
Encryption-management Entities are set out in Domain 1 and 6 (including Annex A as
applicable) of the P2PE Standard and need only be concerned up to the point of initial key
loading. The requirements in Domains 1 and 6 apply to all Encryption-management Entities
whether the entity is a P2PE Component Provider, a P2PE Solution Provider, or a Third-Party
Service Provider performing functions on behalf of a P2PE Solution Provider.

2.1.3.2 Decryption-management Entity
A “Decryption-management Entity” is an entity that performs decryption management
functions for the secure management of the environment that receives encrypted account data
and decrypts such account data.
Specific requirements for Decryption-management Entities are set out in Domains 5 and 6
(including Annex A as applicable) of the P2PE Standard. The requirements in Domains 5 and
6 apply to all Decryption-management Entities whether the entity is a P2PE Component
Provider, a P2PE Solution Provider, or a Third-Party Service Provider performing functions on
behalf of a P2PE Solution Provider.

2.1.3.3 Key-Injection Facilities
The term “Key-Injection Facility” (KIF) describes an entity performing key injection into POI
devices.
Specific requirements for KIFs are set out in Annex B of Domain 6 (including Annex A) of the
P2PE Standard. The requirements apply to all KIFs, whether the entity is a P2PE Component
Provider, a P2PE Solution Provider, or a Third-Party Service Provider performing functions on
behalf of a P2PE Solution Provider.

2.1.3.4 Certification/Registration Authorities
A Certification Authority (CA)/Registration Authority (RA), as defined in the P2PE Standard, is
an entity that signs public keys, whether in X.509 certificate-based schemes or other designs
for use in connection with the remote distribution of symmetric keys using asymmetric
techniques. A Registration Authority (RA) performs registration services on behalf of a CA to
vet requests for certificates that will be issued by the CA.
PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 15

Specific requirements for CAs/RAs are set out in Domain 6 Annex A, Part A2 (and Part A1, as
applicable) of the P2PE Standard. These requirements apply to all CAs/RAs, whether the
entity is a P2PE Component Provider, a P2PE Solution Provider, or a Third-Party Service
Provider performing functions on behalf of a P2PE Solution Provider.

2.1.4 Third-Party Service Providers
As noted in Section 1.4 “Terminology,” a Third-Party Service Provider may provide services or
functions on behalf of a P2PE Vendor, but Third-Party Service Provider must have its services or
functions reviewed during the course of each of its P2PE Vendor customers’ P2PE Assessments.
There is no listing of Third-Party Service Providers on the Website, including within the listing of
the P2PE Product with which the third party’s services or functions were assessed for use.
Refer to Section 2.1.3, “P2PE Component Providers,” to understand how to address Third-Party
Service Providers whose services may be eligible for consideration as a P2PE Component.
Without such applicable services being separately PCI-listed on the List of Validated P2PE
Components, those services (such as KIF, CA/RA, etc.) are not considered P2PE Components
but simply a third-party service provider with respect to the P2PE Solution it is used within.

2.2 Participating Payment Brands
The Participating Payment Brands develop and enforce their respective compliance programs,
including but not limited to, related requirements, mandates, and due dates.

2.3 PCI Security Standards Council
PCI SSC is the standards body that maintains the PCI SSC standards including the PCI DSS, P2PE
Standard, PTS Standard, and PA-DSS. In relation to the P2PE Standard, PCI SSC:


Maintains a centralized repository for all P-ROVs for P2PE Products listed on the Website;



Hosts the List of Validated P2PE Solutions, the List of Validated P2PE Components, and the List of
Validated P2PE Applications on the Website;



Provides required training for and qualifies QSA (P2PE) and PA-QSA (P2PE) Companies and
Employees to assess and validate P2PE Products for P2PE compliance;



Maintains and updates the P2PE Standard and related documentation according to a standards
lifecycle management process; and



Reviews all P-ROVs submitted to PCI SSC and related change submissions for compliance with
baseline quality standards, including but not limited to, confirmation that:


Submissions (including P-ROVs, updates and Interim Self Assessments/Annual
Revalidations) are correct as to form;



QSA (P2PE) and PA-QSA (P2PE) Companies properly determine whether candidate
P2PE Products meet baseline eligibility criteria for validation under the P2PE Program
(PCI SSC reserves the right to reject or de-list any P2PE Solution, P2PE Component,
and/or P2PE Application determined to be ineligible for the P2PE Program);



QSA (P2PE) and PA-QSA (P2PE) Companies adequately report the P2PE compliance
of candidate Products in their associated submissions; and



Detail provided in such submissions meets PCI SSC‘s reporting requirements.

As part of the PCI SSC quality assurance (QA) process, PCI SSC assesses whether overall, QSA
(P2PE) and PA-QSA (P2PE) Company operations appear to conform to PCI SSC‘s quality assurance
and qualification requirements.
PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 16

Note: PCI SSC does not assess or validate P2PE Solutions, P2PE Components, and/or P2PE
Applications for P2PE compliance; assessment and validation is the role of the QSA (P2PE) and/or PAQSA (P2PE) Company, as applicable. Listing of a P2PE Solution, P2PE Component, and/or P2PE
Application on the List of Validated P2PE Solutions, List of Validated P2PE Components, and/or List of
Validated P2PE Applications signifies only that the applicable P2PE Assessor Company has determined
that the application complies with the P2PE Standard, that the P2PE Assessor Company has submitted
a corresponding P-ROV to PCI SSC, and that the P-ROV, as submitted to PCI SSC, has satisfied all
requirements of the PCI SSC for P-ROVs as of the time of PCI SSC's review.

2.4 P2PE Assessor Companies
There are two types of P2PE Assessor Companies:
 QSA (P2PE):

QSA (P2PE) Companies are QSA companies that have been additionally
qualified by PCI SSC to perform P2PE Assessments of P2PE Solutions and
P2PE Components. QSA (P2PE) Companies are not qualified by PCI SSC to
perform P2PE Application Assessments.

 PA-QSA (P2PE):

PA-QSA (P2PE) Companies are PA-QSA companies that have been
additionally qualified by PCI SSC to perform P2PE Assessments of P2PE
Solutions, P2PE Components, and P2PE Applications.

Note:
 Not all QSA Companies are PA-QSA Companies—there are additional qualification requirements
that must be met for a QSA Company to become a PA-QSA Company.


Not all QSA Companies are QSA (P2PE) Companies—there are additional qualification
requirements that must be met for a QSA Company to become a QSA (P2PE) Company.



Not all PA-QSA Companies are PA-QSA (P2PE) Companies—there are additional qualification
requirements that must be met for a PA-QSA Company to become a PA-QSA (P2PE) Company.

P2PE Assessor Companies are responsible for:


Performing assessments of P2PE Solutions and P2PE Components (and P2PE Applications for
PA-QSA (P2PE) Assessor Companies) in accordance with the P2PE Standard and the P2PE
Qualification Requirements.



Providing an opinion regarding whether the P2PE Solution or P2PE Component (or P2PE
Application for PA-QSA (P2PE) Assessor Companies) meets the P2PE Standard.



Documenting each P2PE Assessment in a P-ROV using the applicable P2PE P-ROV Reporting
Template.



Providing adequate documentation within the applicable P-ROV to demonstrate the P2PE
Solution’s or P2PE Component’s (or P2PE Application’s for PA-QSA (P2PE) Assessor
Companies) P2PE compliance.



Where applicable, submitting the applicable P-ROV and/or any change submission to PCI SSC,
along with the applicable P-AOV signed by both the P2PE Assessor Company and P2PE Vendor;



Maintaining an internal quality assurance process for their P2PE Assessment efforts.



Staying up-to-date with Council statements and guidance, P2PE Technical FAQs, industry trends
and best practices.



Determining the scope and applicability of the P2PE Standard as it applies to a given P2PE
Solution Assessment, in accordance with the P2PE Standard.

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 17

It is the QSA (P2PE) Employee’s responsibility to assess a P2PE Solution’s or P2PE Component’s
P2PE compliance (and the PA-QSA (P2PE) Employee’s responsibility to assess a P2PE Application’s
P2PE compliance) as of the date of the P2PE Assessment, and document their findings and opinions
on compliance. As indicated above, PCI SSC does not approve P-ROVs from a technical compliance
perspective but performs quality assurance to confirm that the P-ROVs adequately document the
demonstration of compliance.

2.5 Integrators and Resellers
Integrators and Resellers are those entities that sell, install, and/or service P2PE Solutions on behalf of
P2PE Vendors or others. Integrators and Resellers performing services relating to Validated P2PE
Solutions are responsible for:


Implementing Validated P2PE Solutions in compliance with:
a) All applicable requirements in this document; and
b) The P2PE Instruction Manual.



Configuring P2PE Solutions (where configuration options are provided) according to the validated
processes provided by the P2PE Solution Provider, as documented in the P2PE Instruction
Manual.



Servicing POI devices used in a P2PE Solution—for example, troubleshooting, delivering remote
updates, and providing remote support—according to the validated processes in the P2PE
Instruction Manual.



Ensuring that customers are provided (either directly from the Vendor or from the reseller or
integrator) with a current copy of the P2PE Instruction Manual.

Integrators and Resellers do not submit P2PE Solutions for P2PE Solution Assessments. Only a P2PE
Solution Provider may submit a P2PE Solution for a P2PE Solution Assessment.

2.6 Qualified Integrators and Resellers (QIRs)
PCI Qualified Integrators and Resellers (QIRs) are trained by the Council in PCI DSS and PA-DSS in
order to help ensure that they securely implement Payment Applications. However, the QIR Program
does not apply to the P2PE Program at this time.

2.7 Customers
Merchants are the P2PE Solution customers and users. Customers using a Validated P2PE Solution to
facilitate their PCI DSS compliance are responsible for:


Use of Validated P2PE Solutions, coordinating with their acquirers to determine which solutions
and devices to implement.



Adherence to the P2PE Instruction Manual (PIM), provided to the merchant by the P2PE Solution
Provider and/or integrator/reseller.



Ensuring—if the merchant has other non-P2PE payment channels—that the P2PE environment is
adequately segmented (isolated) from any non-P2PE payment channels.



Removing any legacy cardholder data or systems from the P2PE environment.



Ensuring that their payment environments are validated against applicable PCI DSS requirements
in accordance with applicable payment card brand requirements.

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 18

2.8 PCI-Recognized Laboratories
Security laboratories qualified by PCI SSC under the PCI SSC laboratory program (“PCI-recognized
Laboratories”) are responsible for the evaluation of POI devices against PCI SSC’s PTS Standards and
requirements (“PTS requirements”). Evaluation reports on devices found compliant with the PTS
requirements are submitted by the PCI-recognized Laboratories to PCI SSC for approval; and if
approved, the device is listed on PCI SSC‘s "List of Approved PTS Devices" on the PCI SSC website.
Note: Device evaluation by a PCI-recognized Laboratory is a separate process from the validation of a
P2PE Solution Assessment; the P2PE Solution Assessment validates whether or not a given P2PE
Solution (which may include multiple POI devices) is in compliance with the P2PE Standard.

2.9 Payment Device (Hardware) Vendors
A POI device vendor submits a POI device for evaluation to an independent PCI-recognized
Laboratory. Per PTS requirements, device vendors must develop a supplement document describing
the secure operation and administration of such devices.

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 19

3

Overview of Validation Processes

3.1 Validation Processes for P2PE Solutions, P2PE Components, and
P2PE Applications to be listed on the Website
The P2PE Assessment process is initiated by the P2PE Vendor. The Website has all the associated
documents needed to navigate the P2PE Assessment process. The following is a high-level overview of
the process (other than for Merchant-managed Solutions):
1) The P2PE Vendor selects a P2PE Assessor Company from the Council’s List of P2PE Qualified
Security Assessor Companies and negotiates the cost and any associated P2PE Assessor
Company confidentiality and non-disclosure agreements with the P2PE Assessor Company.
2) The P2PE Vendor then provides to the P2PE Assessor Company access to the Solution,
Component, or Application to be assessed, POI device types, corresponding Implementation
Guides for P2PE Applications, P2PE Instruction Manual for P2PE Solutions, and all associated
manuals and other required documentation, including but not limited to the P2PE Vendor’s signed
Vendor Release Agreement.

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 20

Refer to the sections “P2PE Solutions
and Use of Third Parties and/or P2PE
Component Providers” and “P2PE
Solutions and Use of P2PE Applications
and/or P2PE Non-payment Software” in
the P2PE Standard to understand
options for validating Third-Party Service
Providers, P2PE Component Providers
and P2PE Applications to be used in
P2PE Solutions.
3) The P2PE Assessor Company then
assesses the Solution, Component, or
Application, including its security
functions and features, to determine
whether it complies with the P2PE
Standard.
4) If the P2PE Assessor Company
determines that the Solution,
Component, or Application is in
compliance with the P2PE Standard, the
P2PE Assessor Company submits a
corresponding P-ROV to PCI SSC,
attesting to compliance and setting forth
the results, opinions, and conclusions of
the P2PE Assessor Company on all test
procedures along with the P2PE
Vendor’s signed VRA and the
corresponding P-AOV.

Note: If the P2PE Solution being assessed
includes a P2PE Component and/or P2PE
Application intended for PCI SSC Listing (but not
yet Listed), each such P2PE Product must be
individually submitted to PCI SSC via the Portal –
including the corresponding P-AOV, P-ROV, and
applicable fees – to achieve PCI SSC Listing for
each P2PE Product. This submission must be
Accepted by PCI SSC before review of the P2PE
Solution can occur, though all can be submitted to
PCI SSC and invoiced at the same time. The
review of the paid P2PE Solution will remain on
hold until the Listing of any related pending P2PE
Component and/or P2PE Application.
Note: Only one P2PE Component service can be
included in each submission to PCI SSC for
Listing, even if an entity conducts more than one
component service and they were assessed
together. As noted above, this may not require
separate assessments, but each such component
service must be individually submitted to PCI SSC
via the Portal – including the corresponding PAOV, P-ROV, and applicable fees – to achieve PCI
SSC Listing.
Note: While each P2PE Component service or
P2PE Application requires its own PCI SSC
submission for review and Acceptance, the actual
validation may be part of a larger P2PE
assessment and a separate assessment solely for
the individual component service may not be
required.

5) PCI SSC issues an invoice to the P2PE Vendor for the applicable P2PE Acceptance Fee. After
the P2PE Vendor has paid the invoice, PCI SSC reviews the P-ROV to confirm that it meets the
P2PE Program requirements and if confirmed, PCI SSC notifies the P2PE Assessor Company
and P2PE Vendor that the Solution, Component, or Application has successfully completed the
process.
6) Once the Solution, Component, or Application completes the above process, the Council signs
the corresponding P-AOV and adds the P2PE Solution, P2PE Component, or P2PE Application
to the corresponding List on the Website.
Note: As further addressed in Appendix A hereto, “Acceptance” is limited to the specific P2PE
Solution, P2PE Component, or P2PE Application that has met all applicable Acceptance requirements.
See Appendix A, “P2PE Products and Acceptance.”
The illustrations and descriptions on the following pages explain in further detail processes for the
P2PE Program:

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 21

Process

Illustration

P2PE Product Assessment for Products Intended for PCI SSC Listing

Figure 1

P2PE Product Submission and PCI SSC Review

Figure 2

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 22

Figure 1: P2PE Product Assessment for Products Intended for PCI SSC Listing

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 23

Figure 2: P2PE Product Submission and PCI SSC Review

PCI P2PE Program Guide, v2.0
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 24

3.2 Overview of Validation Processes for Merchant-managed
Solutions
The P2PE Assessment process for Merchant-managed Solutions (MMS) is initiated by the Merchant. The
Website has all the associated documents needed to navigate the assessment process for MMS. The
following is a high-level overview of the process:
1) The Merchant selects a P2PE Assessor Company from the
Council’s List of P2PE Qualified Security Assessor Companies
and negotiates the cost and any associated P2PE Assessor
Company confidentiality and non-disclosure agreements with the
P2PE Assessor Company.

Refer to the sections “P2PE
Solutions and Use of Third
Parties and/or P2PE
Component Providers” and
“P2PE Solutions and Use of
P2PE Applications and/or
2) The Merchant then provides to the P2PE Assessor Company
P2PE Non-payment
access to the MMS to be assessed, POI device types,
corresponding Implementation Guides for P2PE Applications,
Software” in the P2PE
P2PE Instruction Manual for MMS, and all associated manuals
Standard to understand
options for validating Thirdand other required documentation.
3) The P2PE Assessor Company then assesses the MMS, including Party Service Providers,
its security functions and features, to determine whether the MMS P2PE Component
Providers, and P2PE
complies with the P2PE Standard.
Applications.
4) If the P2PE Assessor Company determines that the MMS, is in compliance with the P2PE
Standard, the P2PE Assessor Company prepares and submits to the Merchant a corresponding
Solution P-ROV attesting to compliance and setting forth the results, opinions and conclusions of
the P2PE Assessor Company on all test procedures.
Note: Merchant-managed Solutions are not eligible for listing on the Website, and the P-ROV is not
submitted to PCI SSC. A Merchant-managed Solution may utilize third-party service providers, listed
P2PE Applications and/or listed P2PE Components.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 25

4

Preparation for the Review

The P2PE Standard is a cross-functional PCI SSC standard that includes specific requirements that have
been validated through other PCI SSC programs, such as PTS or PCI DSS. The P2PE Standard also
contains specific requirements for overall P2PE Solutions and for the encryption device processes,
merchant guidance, decryption environments and cryptographic keys that are used throughout the P2PE
Solution.

4.1 Considerations for Secure Cryptographic Devices (SCDs),
Vendors of P2PE Applications and Non-payment Software, and
Providers of P2PE Components for use in P2PE Solutions
Note: Applications used within P2PE Solutions may or may not be eligible for PA-DSS validation. PADSS and P2PE are distinct PCI SSC standards with different requirements; validation against one of
these standards does not guarantee or provide automatic validation against the other standard.
Note: A PA-DSS assessment is not required or necessary for a P2PE Application or Non-payment
Software to be used in a P2PE Solution.
The following table should be used to determine requirements and eligibility, along with the relevant
reference sections of the P2PE Standard:

Table 4.1
Possible
Element
SCDs

Program Guidance
Validated P2PE Solutions require the use of various types of SCDs. To assist in
evaluating these device types for use in a P2PE Solution:


Refer to “Definition of Secure Cryptographic Devices (SCDs) to be used in
P2PE Solutions” in the Introduction section of the P2PE Standard for
requirements for these devices;



Use the “SCD Domain Applicability” matrix in the Introduction section of the
P2PE Standard.

Obtaining and maintaining PTS device approval (for those SCDs that require
approval) is the responsibility of the secure cryptographic device vendor. For those
SCDs required to be approved, such approval is a prerequisite for the devices
being assessed as part of a P2PE Solution Assessment. P2PE Assessors will
request evidence of device approvals being in place and current as part of
performing a P2PE Solution Assessment.
Device vendors wishing to obtain PTS approval should consult the Website for
further information. Obtaining PTS approval does not replace or supersede any
payment card brand-specific device-approval processes.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 26

Possible
Element
P2PE
Applications

Program Guidance


Refer to definition in P2PE Glossary.



Refer to “P2PE Solutions and Use of P2PE Applications and/or P2PE Nonpayment Software” in the Introduction section of the P2PE Standard.



Must undergo validation per all P2PE Domain 2 Requirements by a PA-QSA
(P2PE), and will be either:







P2PE
Non-payment
Software

Independently listed on the List of Validated P2PE Applications
OR
Not listed on the List of Validated P2PE Applications and therefore only
considered an element of the specific Validated P2PE Solution for which it
has been submitted.

If a P2PE Application is currently listed on the List of Validated P2PE
Applications AND was assessed against the same major version of the P2PE
standard, only the applicable Domain 1 Testing Procedures must be assessed
and evidenced in the Solution P-ROV for each P2PE Solution Assessment in
which the application is used.
If a P2PE Application is not already on the List of Validated P2PE Applications,
both the Application P-ROV and the Solution P-ROV must be submitted before
the P2PE Solution can be Accepted. This applies for each P2PE Solution in
which the application is used.



Refer to definition in P2PE Glossary.



Refer to “P2PE Solutions and Use of P2PE Applications and/or P2PE Nonpayment Software” in the Introduction section of the P2PE Standard.



Assessed only per designated P2PE Domain 1 Requirements as noted in the
above referenced section of the P2PE Standard, by a P2PE Assessor
Company.



Not eligible for PCI-listing.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 27

Possible
Element
P2PE
Components

Program Guidance
There are four P2PE Component products or services that can be separately
assessed and PCI-listed in isolation of any P2PE Solution defined in the P2PE
Standard.


Refer to definition in P2PE Glossary.



Refer to “P2PE Solutions and Use of Third Parties and/or P2PE Component
Providers” in the Introduction section of the P2PE Standard.

Independent PCI SSC listing of Third-Party Service Provider component services
depends on eligibility and is optional. However, such independent listing is required
for a given component service to be recognized as a Validated P2PE Component
that can be used in multiple P2PE Solutions without the need for full P2PE
Assessment of those services each time it is used with a different P2PE Solution.


If a P2PE Component is currently listed on the List of Validated P2PE
Components, the Component P-ROV has already been Accepted by PCI SSC.
As a result, only the applicable Testing Procedures must be assessed and
evidenced in the Solution P-ROV for each Validated P2PE Component
included in the applicable P2PE Solution



If a P2PE Component is not already on the List of Validated P2PE Components
but is being added to the List of Validated P2PE Components, the Component
P-ROV must be submitted and Accepted before the Solution P-ROV can be
Accepted.

If independent listing is not being pursued for a P2PE Component, this is instead
considered a Third-Party Service Provider’s service offering and it is only an
element of the specific Validated P2PE Solution within which it is assessed.
Third-Party
Service
Provider

Refer to “P2PE Solutions and Use of Third Parties and/or P2PE Component
Providers” in the Introduction section of the P2PE Standard.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 28

4.2 Prior to the Review
Note: The process for developing and validating P2PE Solutions—including responsibilities for
implementing requirements and validating compliance with each Domain—is defined within the P2PE
Standard.
Prior to commencing a P2PE review with a P2PE Assessor Company, all parties involved are
encouraged to take the following preparatory actions:


Review the requirements of both the PCI DSS and the P2PE Standard and all related
documentation located at the Website.



Determine/assess the Solution’s, Component’s, or Application’s readiness to comply with P2PE:
 Perform a gap analysis between the Solution’s, Component’s, or Application’s security
functionality and the P2PE Standard;
 Correct any gaps; and
 If desired, the P2PE Assessor Company may perform a pre-assessment or gap analysis of a
P2PE Solution, Component, or Application. If the P2PE Assessor Company notes
deficiencies that would prevent a compliant result, the P2PE Assessor Company will provide
a list of P2PE features to be addressed before the formal review process begins.



Determine whether the P2PE Application Provider’s Implementation Guide meets P2PE Standard
requirements and correct any gaps.



Determine whether the P2PE Solution Provider’s P2PE Instruction Manual meets P2PE Standard
requirements and correct any gaps.



P2PE Solution Providers are responsible for ensuring that the various components and
applications (including those provided by Third-Party Service Providers, P2PE Application
Vendors, and/or P2PE Component Providers) used as part of their P2PE Solutions are all
compliant with all applicable requirements of the P2PE Standard, and that appropriate agreements
are in place with such providers and vendors to ensure proper information disclosures if required
under the Vendor Release Agreement.

4.3 Required Documentation and Materials
All completed P2PE Assessment-related materials such as manuals, the P2PE Instruction Manual,
P2PE Application Implementation Guide, the Vendor Release Agreement and all other materials related
to the P2PE Assessment and participation in the P2PE Program must be delivered to the P2PE
Assessor Company performing the assessment, not to PCI SSC.

4.4 P2PE Review Timeframes
The amount of time necessary for a P2PE Assessment can vary widely depending on factors such as:


How close the P2PE Product is to being P2PE-compliant at the start of the Assessment




Corrections to the P2PE Product to achieve compliance will delay validation.

For P2PE Solutions that use P2PE Applications and/or P2PE Components


Those that are being listed on the Website separately must be Listed before the P2PE
Solution can be reviewed.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 29



Whether the P2PE Application’s Implementation Guide and/or P2PE Implementation Manual
meets all P2PE Requirements at the start of the Assessment




Prompt payment of the fees due to PCI SSC




Extensive rewrites will delay validation.

PCI SSC will not commence review of the P-ROV until the applicable fee has been paid.

Quality of the P2PE Assessor Company's submission to PCI SSC


Incomplete submissions or those containing errors—for example, missing or unsigned
documents, incomplete or inconsistent submissions—will result in delays in the review
process.



If PCI SSC reviews the P-ROV more than once, providing comments back to the P2PE
Assessor Company to address each time, this will increase the length of time for the
review process.

Any P2PE Assessment timeframes provided by a P2PE Assessor Company should be considered
estimates, since they may be based on the assumption that the P2PE Product is able to successfully
meet all P2PE requirements quickly. If problems are found during the review or acceptance processes,
discussions between the P2PE Assessor Company, the P2PE Vendor, and/or PCI SSC may be
required. Such discussions may significantly impact review times and cause delays and/or may even
cause the review to end prematurely (for example, if the P2PE Vendor decides they do not want to
make the necessary changes to achieve compliance).

4.5 P2PE Assessors
PCI SSC qualifies and provides required training for P2PE Assessor Companies (QSA (P2PE) and PAQSA (P2PE)) to assess and validate P2PE Products for adherence to the P2PE Standard. In order to
perform P2PE Solution Assessments and/or P2PE Component Assessments, a P2PE Assessor
Company must have been qualified by PCI SSC and remain in Good Standing (as defined in the QSA
Qualification Requirements and P2PE Qualification Requirements, as applicable) or in remediation as
both a QSA Company and QSA (P2PE) Company. In order to perform P2PE Application Assessments,
a P2PE Assessor Company must have been additionally qualified by PCI SSC and remain in Good
Standing (as defined in the QSA Qualification Requirements and P2PE Qualification Requirements, as
applicable) or in remediation as both a PA-QSA Company and PA-QSA (P2PE) Company. All
recognized P2PE Assessor Companies are listed on the Website. These are the only assessors
recognized by PCI SSC as qualified to perform P2PE Assessments.


For each P2PE Assessment, the resulting P2PE Assessor report must follow the P2PE Report on
Validation (P-ROV) template and instructions, as outlined in the corresponding P2PE Solution,
P2PE Component, and P2PE Application P2PE P-ROV Reporting Template.



The P2PE Assessor Company must prepare each P-ROV based on evidence obtained by
following the P2PE Standard.



Each P-ROV submitted to PCI SSC must be accompanied by a corresponding P2PE Attestation
on Validation (P-AOV) in the form available through the Website, signed by a duly authorized
officer of the P2PE Assessor Company, that summarizes whether the entity is in compliance or is
not in compliance with PCI P2PE and any related findings, as well as the P2PE Application
Implementation Guide (as applicable) and P2PE Implementation Manual.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 30

4.5.1 P2PE Assessor Company Fees
The prices and fees charged by P2PE Assessor Companies are not set by PCI SSC. These fees
are negotiated between the P2PE Assessor Company and their customers. Before deciding on a
P2PE Assessor Company, it is recommended that a prospective customer check the list of P2PE
Qualified Assessor Companies, talk to several P2PE Assessor Companies, and follow their own
vendor-selection processes.

4.5.2 Non-P2PE assessment services that may be offered by P2PE Assessor
Companies
The list below provides examples of non-P2PE Assessment services that may be offered by
P2PE Assessor Companies. These services are neither required nor recommended by PCI SSC.
If these services are of interest to your company, please contact the P2PE Assessor Companies
for availability and pricing. Examples of non-P2PE Assessment services include, but are not
limited to:


Guidance on designing P2PE Solutions in accordance with the P2PE Standard



Review of P2PE Solution design, response to questions via e-mail or phone, and
participation in conference calls to clarify requirements



Guidance on preparing the P2PE Instruction Manual and/or P2PE Application
Implementation Guide



Pre-assessment (gap analysis) services prior to beginning formal P2PE Assessment



Guidance for bringing the Solution, Component, or Application into compliance with the
P2PE Standard if gaps or areas of non-compliance are noted during the assessment
Note: When arranging for non-P2PE Assessment services with a P2PE Assessor Company,
care should be taken by both the P2PE Assessor Company and its customer to ensure that
the P2PE Assessor Company satisfies all independence requirements as set forth in the QSA
Qualification Requirements—for example, that a P2PE Assessor Employee does not assess
its own work product as part of the actual P2PE Assessment. Conflicts of interest may result
in the P-ROV being rejected by PCI SSC.

4.6 Technical Support throughout Testing
It is recommended that the P2PE Vendor (or in the case of a Merchant-managed Solution, the
Merchant) make available a technical resource person to assist with any questions that may arise
during the assessment. During the review, and to expedite the process, a technical contact should be on
call to discuss issues and respond to questions from the P2PE Assessor Company.

4.7 Vendor Release Agreement (VRA)
For any P2PE Product to be listed on the Website, the P2PE Vendor’s signed copy of the most-current
version of the Vendor Release Agreement available on the Website must be provided to the P2PE
Assessor Company along with access to the P2PE Product and other documents and materials at the
beginning of each P2PE Assessment process
Among other things, the VRA:



Covers confidentiality issues;



Covers the P2PE Vendor’s agreement to P2PE Program requirements, policies and procedures;

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 31



Gives permission to the P2PE Vendor’s P2PE Assessor Company to release P-ROVs and related
materials to PCI SSC for review; and



Requires P2PE Vendors to adopt and comply with industry standard Vulnerability Handling
Policies.

For PCI SSC review of a P-ROV to take place:



The P2PE Assessor Company must provide to PCI SSC the P2PE Vendor’s signed copy of the
then-current VRA, along with the initial P-ROV submitted to PCI SSC in connection with that P2PE
Assessment.



So long as an executed copy of the current VRA is on file with PCI SSC for the relevant P2PE
Vendor, the P2PE Assessor is not required to re-submit the same VRA with each subsequent PROV for the same P2PE Vendor.

4.8 The Portal
For any P2PE Solution, P2PE Component, or P2PE Application to be listed on the Website all
documents relating to the P2PE validation process are to be submitted by the applicable P2PE
Assessors, on behalf of the P2PE Vendor, to the Council through the PCI SSC’s secure website
(“Portal”). Submissions are pre-screened in the Portal by Council staff to ensure that all required
documentation has been included and the basic submission requirements have been satisfied.
The Portal is also used by the Council to track all communications relating to a particular submission.

4.9 P2PE Acceptance Fees
For each P2PE Product to be listed on the Website, the
P2PE Vendor is also required to pay a P2PE Acceptance
Fee to PCI SSC. For each new P2PE Product
submission, the corresponding P2PE Acceptance Fee
will be invoiced and must be received by PCI SSC before
the P2PE submission will be reviewed, Accepted, and
added to the corresponding List of Validated P2PE
Solutions, List of Validated P2PE Components, or List of
Validated P2PE Applications. Upon Acceptance, PCI
SSC will sign and return a copy of the corresponding PAOV to both the P2PE Vendor and the P2PE Assessor
Company.

Note:
All P2PE Assessment-related fees
are payable directly to the P2PE
Assessor Company (these fees are
negotiated between the P2PE
Assessor Company and their
customers).
PCI SSC will bill the P2PE Vendor for all
P2PE Acceptance Fees and the P2PE
Vendor will pay these fees directly to PCI
SSC.

There are no annual recurring PCI SSC fees associated with the Acceptance of a P2PE Product. There
are, however, PCI SSC fees associated with P2PE Vendor delays in annual revalidation of P2PE
Validated Products. Please see the Website for more information.
All Program fees are non-refundable and are subject to change upon posting of revised fees on the
Website.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 32

5

Managing a Validated P2PE Listing

5.1 Annual Revalidation
Annually, by the Interim Assessment Due date (i.e., the anniversary date of the P2PE Product’s
Acceptance), the P2PE Vendor is required to submit an updated P2PE Attestation of Validation,
performing the Interim Self-Assessment steps (as indicated in the P-AOV). PCI SSC will provide
notification via email to the P2PE Vendor Contact (listed on the P-AOV) within 90 days of
revalidation/reassessment, but it is the sole responsibility of the P2PE Vendor to maintain the listing
regardless of the successful receipt of the courtesy reminder(s).
As part of this annual process, P2PE Vendors are required to confirm whether any changes have been
made to the P2PE Solution, P2PE Component, or P2PE Application, and that:
a) Changes have been applied in a way that is consistent with the P2PE Standard;
b) The P2PE Solution, P2PE Component, or P2PE Application continues to meet the
requirements of the P2PE Standard;
c) The PCI SSC has been advised of any change that necessitates a change to the listing on the
Website, in accordance with this Program Guide.
The P2PE Vendor is required to give consideration to the impact of external threats and whether
updates to the P2PE Solution, P2PE Component, or P2PE Application are necessary to address
changes to the external threat environment.The updated P-AOV should be submitted via email to the
P2PE Program Manager. If an updated P-AOV is not submitted in a timely manner, the P2PE Listing
will be subject to early administrative expiry, as follows:


On the Interim Assessment Due Date, the corresponding List will be updated to show the P2PE
Listing in Orange for a period of 90 days.



If the updated and complete P-AOV is received within this 90-day period, PCI SSC will update the
corresponding List with the new Interim Assessment Due Date and remove the Orange status.



If the updated and complete P-AOV is not received within this 90-day period, the corresponding
List will be updated to show the P2PE Listing in Red.



Once in Red, a full assessment (including applicable fees) is required to return the P2PE Listing
status to good standing.

PCI SSC will, upon receipt of the updated P2PE Attestation of Validation: (i) review the submission for
completeness; (ii) once completeness is established, update the List of Validated P2PE Solutions, List
of Validated P2PE Components, or List of Validated P2PE Applications with the new Interim
Assessment Due Date; and (iii) sign and return a copy of the updated P2PE Attestation of Validation to
the P2PE Vendor.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 33

5.2 Changes to P2PE Listings
P2PE Vendors may update listed P2PE Solutions, P2PE Components, or P2PE Applications for various
reasons—for example, adding additional software applications. Changes do not have any impact on
Interim Assessment Due Date or Reassessment Dates of P2PE Listings. Changes are categorized as
follows:

Table 5.2.a – Changes to P2PE Listings for Solutions and Components
Change Type
Designated

Description
Designated Changes to P2PE Solutions or P2PE Components are limited to the
following:


Add/Remove P2PE Component;



Add/Remove PCI-approved POI Device Type;



Add/Remove P2PE Application.

See Section 5.2.2, “Designated Changes for P2PE Solutions and P2PE
Components,” for details.
Interim

Interim Changes are not reported in detail but are addressed by the P2PE Vendor
during the Annual Revalidation process via the Interim Self-Assessment. These
changes will include:


Any change that impacts compliance with the requirements of the P2PE
Standard for a P2PE Solution or P2PE Component, but is not considered a
“Designated Change.”

 Any other change that does not impact compliance with the requirements of
the P2PE standard for a given P2PE Product.
Administrative

Changes made to a listed P2PE Solution or P2PE Component that have no
impact on the compliance of the P2PE Listing with any requirements of the P2PE
Standard, but where the List of Validated P2PE Solutions or List of Validated
P2PE Components is updated to reflect the change.
Examples of administrative changes include, but are not limited to, corporate
identify changes, P2PE Solution name changes, changes to listing details such
as “Regions Served” (P2PE Solutions only) or “Description Provided by,” etc.
See Section 5.2.1, “Administrative Changes for P2PE Listings,” for details.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 34

Table 5.2.b – Changes to P2PE Listings for Applications
Change Type
Delta
(low impact)

No Impact
Change

Description
Delta Changes are applicable only to P2PE Applications and are limited to the
following:


Changes where less than half of the P2PE Application’s functionality is
affected; and



Changes where less than half of the Domain 2 Requirements/subRequirements are affected; and



Changes where less than half the P2PE Application’s code-base is changed.
See Section 5.2.4, “Delta Changes for P2PE Applications,” for details.

Any other change that does not impact compliance with the requirements of the
P2PE standard for a given P2PE Product.
No Impact Changes are not reported in detail, but are addressed by the P2PE
Vendor during the Annual Revalidation process.

Administrative

Changes made to a P2PE Application that have no impact on the compliance of
the P2PE Listing with any requirements of the P2PE Standard, but where the List
of Validated P2PE Applications is updated to reflect the change.
Examples of administrative changes include, but are not limited to, corporate
identify changes, P2PE Application name changes, and changes to listing details
such as “Description Provided By Application Vendor,” etc.
See Section 5.2.1, “Administrative Changes for P2PE Listings,” for details.

5.2.1 Administrative Changes for P2PE Listings
Administrative Changes are limited to updates where no changes to a listed P2PE Solution,
P2PE Component, or P2PE Application have occurred but the P2PE Vendor wishes to request a
change to the way the P2PE Solution, P2PE Component, or P2PE Application is currently listed
on the corresponding List on the Website.
See Section 5.3, “Change Documentation,” for specifics on the
below:
The P2PE Vendor prepares a Vendor Change Analysis (for
example, using the corresponding P2PE Change Impact Template in
the Appendices) and submits it to the P2PE Assessor Company for
review, along with the updated P2PE Application Implementation
Guide or P2PE Implementation Manual. The change analysis must
contain the following information at a minimum:


Name and reference number of the Validated P2PE Listing



Description of the change



Description of why the change is necessary

Note:
Administrative
Changes are only
permissible to alreadylisted P2PE Solutions,
P2PE Components,
and P2PE Applications
that have not expired.

It is recommended that the P2PE Vendor submit the Vendor Change Analysis to the same P2PE
Assessor Company used for the original P2PE Solution Assessment.
PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 35

If the P2PE Assessor Company agrees that the change as documented by the P2PE Vendor is
eligible as an Administrative Change:
1) The P2PE Assessor Company must notify the P2PE Vendor that they agree;
2) The P2PE Vendor prepares and signs the corresponding P-AOV, and sends it to the P2PE
Assessor Company;
3) If applicable, the P2PE Vendor modifies the P2PE Instruction Manual and/or P2PE
Application Implementation Guide and/or completes a new VRA;
4) The P2PE Assessor Company completes the corresponding P2PE Change Impact
Template in the Appendix;
5) The P2PE Assessor signs their concurrence on the P-AOV and forwards it, along with the
corresponding P2PE Change Impact report, to PCI SSC;
6) PCI SSC will then issue an invoice to the P2PE vendor for the applicable change fee; and
7) Upon payment of the invoice, PCI SSC will review Administrative Change submission for
quality assurance purposes.
If the P2PE Assessor Company does not agree with the P2PE Vendor that the change as
documented in the Vendor Change Analysis is eligible as an Administrative Change, the P2PE
Assessor Company returns the Vendor Change Analysis to the P2PE Vendor and works with the
P2PE Vendor to consider the actions necessary to address the P2PE Assessor Company’s
observations.
Following successful PCI SSC quality assurance review of the change, PCI SSC will:
1) Amend the corresponding List of Validated P2PE Solutions, List of Validated P2PE
Components, or List of Validated P2PE Applications on the Website accordingly with the
new information; and
2) Sign and return a copy of the corresponding P2PE Attestation of Validation to both the
P2PE Vendor and the P2PE Assessor Company. The Revalidation date of the updated
listing will be the same as that of the parent listing.
For quality issues associated with any aspect of the submission, PCI SSC communicates those
issues to the P2PE Assessor Company. PCI SSC reserves the right to reject any P2PE Change
Impact document if it determines that a change described therein and purported to be an
Administrative Change by the P2PE Assessor Company or P2PE Vendor is ineligible for
treatment as an Administrative Change.

5.2.2 Designated Changes for P2PE Solutions and P2PE Components
Designated Changes are changes made to a listed P2PE Solution or P2PE Component (where
applicable) to:


Add/remove a validated POI device; or



Add/remove a validated P2PE Application ; or



Add/remove a validated P2PE Component used in a P2PE Solution

Designated Changes result in an amendment to a P2PE Solution or P2PE Component as
currently listed on the corresponding List on the Website.
See Section 5.3, “Change Documentation,” for specifics on the below.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 36

The P2PE Vendor prepares a Vendor Change Analysis (for example, using the corresponding
P2PE Change Impact Template in the Appendices) and submits it to the P2PE Assessor
Company for review, along with the updated P2PE Implementation Manual, as applicable. The
change analysis must contain the following information at a minimum:


Name and reference number of the Validated P2PE Listing



Description of the change



Description of why the change is necessary

It is recommended that the P2PE Vendor submit the Vendor Change Analysis to the same P2PE
Assessor Company used for the original assessment.
If the P2PE Assessor Company agrees that the change as documented by the P2PE Vendor is
eligible as a Designated Change:
1) The P2PE Assessor Company must notify the P2PE Vendor that they agree;
2) If applicable, the P2PE Vendor modifies the P2PE Instruction Manual and/or completes a
new VRA and submits this to the P2PE Assessor Company;
3) The P2PE Assessor Company must perform an assessment of the requirements of the
P2PE Standard that are affected by the change. Details of the tests that must be performed
are available within the “Designated Changes” sections of the corresponding P2PE Change
Impact Template in the Appendices.
4) The P2PE Assessor Company completes the corresponding P2PE Change Impact
Template in the Appendices and must produce a red-lined P-ROV and document the
testing completed per PCI SSC requirements;
5) The P2PE Vendor prepares and signs the corresponding P-AOV and sends it to the P2PE
Assessor Company;
6) The P2PE Assessor signs its concurrence on the P-AOV and forwards it along with the
completed P2PE Change Impact Template, the P2PE Solution’s updated P2PE Instruction
Manual (as applicable), VRA (as applicable), and the red-lined P-ROV to PCI SSC;
7)

PCI SSC will then issue an invoice to the P2PE Vendor for the applicable change fee; and

8) Upon payment of the invoice, PCI SSC will review the Designated Change submission for
quality assurance purposes.
If the P2PE Assessor Company does not agree with the P2PE Vendor that the change as
documented in the Vendor Change Analysis is eligible as a Designated Change, the P2PE
Assessor Company returns the Vendor Change Analysis to the P2PE Vendor and works with the
P2PE Vendor to consider the actions necessary to address the P2PE Assessor Company’s
observations.
Following successful PCI SSC quality assurance review of the change, PCI SSC will:
1) Amend the corresponding List of Validated P2PE Solutions or List of Validated P2PE
Components on the Website accordingly with the new information; and
2) Sign and return a copy of the corresponding P2PE Attestation of Validation to both the
P2PE Vendor and the P2PE Assessor Company. The Revalidation date of the updated
listing will be the same as that of the parent listing.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 37

For quality issues associated with any aspect of the submission, PCI SSC communicates those
issues to the P2PE Assessor Company. PCI SSC reserves the right to reject any P2PE Change
Impact document if it determines that a change described therein and purported to be a
Designated Change by the P2PE Assessor Company or P2PE Vendor is ineligible for treatment
as a Designated Change.

5.2.3 Wildcards for P2PE Applications
All P2PE Application changes must result in a new
application version number; however, whether this
affects the version number listed on the Website
depends on the nature of the change and the
Vendor’s defined, documented versioning
methodology. The use of wildcards may be permitted
for managing the versioning methodology for No
Impact changes only.

Note: Wildcards may only be
substituted for elements of the version
number that represent non-securityimpacting changes; the use of
wildcards for any change that has an
impact on security or any P2PE
Requirements is prohibited.

Only those P2PE applications that have had the P2PE Vendor’s wildcard versioning methodology
assessed to P2PE v2 by a PA-QSA (P2PE) Assessor Company are eligible for wildcard usage
and listing on the Website with wildcards. Changes falling within the scope of wildcard usage are
not required to be advised to PCI SSC; therefore, any such changes will not result in an update to
the P2PE Application listing on the Website. See Appendix H, “P2PE Application Software
Version Methodology,” for additional information regarding the use of wildcards.

5.2.4 Delta Changes for P2PE Applications
Delta Changes are changes made to a listed P2PE Application and are limited to the following:


Changes where less than half of the P2PE Application’s functionality is affected; and



Changes where less than half of the Domain 2 Requirements/sub-Requirements are
affected; and



Changes where less than half the P2PE Application’s code-base is changed.

Since the number of possible P2PE Application changes and their impact cannot be determined
in advance, the type of assessment required must be considered on a per-case basis. P2PE
Application Vendors are encouraged to contact the P2PE Assessor Company that performed the
last full validation of the P2PE Application for guidance. The P2PE Assessor Company engaged
by the P2PE Vendor for this purpose then determines whether a full P2PE Application
Assessment or Delta Assessment of the P2PE Application is required, based on the degree to
which the changes impact the security and/or P2PE-related functions of the P2PE Application,
the impact to P2PE Requirements, and/or the scope of the changes being made.
See Section 5.3, “Change Documentation,” for specifics on the below.
The P2PE Application Vendor prepares a Vendor Change Analysis (for example, using the
corresponding P2PE Change Impact Template in the Appendices) and submits it to the P2PE
Assessor Company for review, along with the updated P2PE Application Implementation Guide.
The change analysis must contain the following information at a minimum:


Name and reference number of the Validated P2PE Application Listing



Description of the change



Description of why the change is necessary

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 38

It is highly recommended that the P2PE Application Vendor submit the Vendor Change Analysis
to the same P2PE Assessor Company used for the original assessment. If the P2PE Assessor
Company does not agree with the P2PE Application Vendor that the change as documented in
the Vendor Change Analysis is eligible as a Delta Change, the P2PE Assessor Company returns
the Vendor Change Analysis to the P2PE Application Vendor and works with the P2PE
Application Vendor to consider the actions necessary to address the P2PE Assessor Company’s
observations.
If the P2PE Assessor Company agrees that the change as documented by the P2PE Application
Vendor is eligible as a Delta Change:
1) The P2PE Assessor Company must notify the P2PE Application Vendor that they agree;
2) The P2PE Application Vendor modifies the P2PE Application Implementation Guide and/or
completes a new VRA (if applicable) and sends it to the P2PE Assessor Company;
3) The P2PE Assessor Company performs a Delta Assessment of the P2PE Application for
the P2PE Requirements affected by the changes;
4) The P2PE Assessor Company tests the P2PE Application’s affected functionality;
5) The P2PE Assessor Company completes the appropriate P2PE Change Impact Template
in the Appendices, providing the detail of the changes to the P2PE Application, and must
produce a red-lined P-ROV and document the testing completed per PCI SSC
requirements;
6) The P2PE Application Vendor prepares and signs the corresponding P-AOV and sends it to
the P2PE Assessor Company;
7) The P2PE Assessor signs its concurrence on the P-AOV and forwards it, along with the
completed P2PE Change Impact document, the P2PE Application’s updated P2PE
Implementation Guide, the P2PE Vendor’s signed current VRA (if not already on file with
PCI SSC), and the red-lined Application P-ROV to PCI SSC;
8) PCI SSC will then issue an invoice to the P2PE Application Vendor for the applicable
change fee; and
Upon payment of the invoice, PCI SSC will review the Delta Change submission for quality
assurance purposes.Following successful PCI SSC quality assurance review of the change, PCI
SSC will:
1) Amend the corresponding List of Validated P2PE Applications on the Website accordingly
with the new information; and
2) Sign and return a copy of the corresponding P2PE Attestation of Validation to both the
P2PE Application Vendor and the P2PE Assessor Company. The expiry date of this newly
listed P2PE Application will be the same as that of the parent P2PE Application.
For quality issues associated with any aspect of the submission, PCI SSC communicates those
issues to the P2PE Assessor Company. PCI SSC reserves the right to reject any P2PE Change
Impact document if it determines that a change described therein and purported to be a Delta
Change by the P2PE Assessor Company or P2PE Application Vendor is ineligible for treatment as
a Delta Change.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 39

Delta assessment example:
Assuming the above defined criteria for a delta assessment is met, examples of low-impact
changes to a Validated P2PE application that could be included in a delta assessment may
include, but are not limited to:

5.3



Addition of a POI device type to be supported by the P2PE Application



Discontinuing support of a POI device currently supported by the P2PE Application



Inclusion of updates or patches



Recompilation of unchanged code-base

Change Documentation

Administrative Change
(All P2PE Products)

Interim SelfAssessment
(All P2PE Products)

 P2PE Attestation Of
Validation

 P2PE Attestation Of
Validation

Delta Change
(Application)

Designated Change
(Solution or
Component)

 P2PE Attestation Of
Validation

 P2PE Attestation Of
Validation

 P2PE Change
Impact document**

 P2PE Change Impact
document***

 P2PE Change
Impact document **

 P2PE
Implementation
Guide *

 Red-lined P-ROV

 Red-lined P-ROV

 P2PE Implementation
Guide

 P2PE Instruction
Manual *

 Current VRA*

 P2PE
Implementation
Guide *

 Current VRA*
 Fee

 Fee

 P2PE Instruction
Manual *
 Current VRA*
 Fee

*

If applicable

**

Note: The P2PE Change Impact – P2PE Solutions and P2PE Components documents in the Appendix
are mandatory for the P2PE Assessor Company for submitting Administrative and Designated Changes
to PCI SSC on behalf of P2PE Solution Providers and P2PE Component Service Providers.

*** Note: The P2PE Change Impact – P2PE Applications document in the Appendix is mandatory for the
P2PE Assessor Company for submitting Administrative and Delta Changes to PCI SSC on behalf of the
P2PE Application Vendor, but may also be used by Vendors as a Vendor Change Analysis.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 40

5.4 Renewing Expiring Listings
As a P2PE Product listing approaches its reassessment date, PCI SSC will notify the P2PE Vendor of
the pending expiration. The two options available for Vendor consideration are either new validation or
expiry:
 New Validation:

If the P2PE Vendor wishes the P2PE Product listing to remain on the
corresponding P2PE Product list on the Website, the P2PE Vendor must contact
a P2PE Assessor Company to have the P2PE Product fully re-evaluated against
the then-current version of the P2PE Standard, resulting in a new Acceptance, on
or before the applicable Reassessment Date. This reassessment must follow the
same process as an initial P2PE Assessment of the applicable P2PE Product.

 Expiry:

Listings of P2PE Products for which a new Acceptance has not occurred on or
before the applicable expiration date/reassessment date, will appear in Orange
for the first 90 days, and in Red thereafter.

5.5 Validation Maintenance Fees
If a listed P2PE Solution, P2PE Component, or P2PE
Application is revised, the P2PE Vendor is required to pay the
applicable change fee to PCI SSC.
For any change affecting the listing of a validated P2PE
Solution, P2PE Component, or P2PE Application, the
applicable fee will be invoiced and must be received by PCI
SSC for the changes to be Accepted and added to the
corresponding P2PE List. Upon Acceptance, PCI SSC will
sign and return a copy of the P-AOV to both the P2PE
Vendor and the P2PE Assessor Company.
There is no PCI SSC fee associated with the processing of
Interim Self-Assessments.
All P2PE Program fees are posted on the Website. Program
fees are non-refundable and are subject to change upon
posting of revised fees on the Website.

Note:
The P2PE Vendor pays all P2PE
Assessment-related fees directly to
the P2PE Assessor. (These fees are
negotiated between the P2PE Vendor
and the P2PE Assessor Company.)
PCI SSC will invoice the P2PE
Vendor for all Validation Maintenance
Fees, and the P2PE Vendor will pay
these fees directly to PCI SSC.
A parent P2PE listing must already
exist on the corresponding List and
not yet have expired in order to have
a change Accepted and Listed.

5.6 Notification Following a Security Breach, Compromise, or Known
or Suspected Vulnerability
In the event of a Security Issue (defined in the VRA) relating to a Validated P2PE Product, the VRA
requires the applicable P2PE Vendor to notify PCI SSC.

5.6.1 Notification and Timing
Notwithstanding any other legal obligations, pursuant to the VRA, the P2PE Vendors are required
to notify PCI SSC of all such Security Issues within the period of time specified in the VRA,
including the related information pursuant to the VRA, and to provide follow-up information which
may include (without limitation) an assessment of any impact (possible or actual) that the Security
Issue has had or may or will have.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 41

5.6.2 Notification Format
The P2PE Vendor’s Security Issue notification to PCI SSC must be in writing in accordance with
the VRA, and should be preceded by a phone call to the PCI P2PE Program Manager at (781)
876-8855.

5.6.3 Notification Details
Information provided pursuant to such written notice and to the PCI P2PE Program Manager
should include (but is not limited to) the following:


The name, PCI SSC approval number, and any other relevant identifiers of each of the
P2PE Vendor’s P2PE Product(s) affected by the Security Issue;



A description of the general nature of the Security Issue;



The P2PE Vendor’s good-faith assessment, to its knowledge at the time, as to the scope
and severity of the vulnerability or vulnerabilities associated with the Security Issue (using
CVSS or other industry-accepted standard scoring); and



Assurance that the P2PE Vendor is following its Vulnerability Handling Policies.

5.6.4 Actions following a Security Breach or Compromise
In the event of PCI SSC being made aware of a Security Issue related to a Validated P2PE
Product, PCI SSC may take the actions specified in the VRA and additionally, may:


Notify Participating Payment Brands that a Security Issue has occurred.



Request a copy of the latest version of the P2PE Vendor’s Vulnerability Handling Policies.



Communicate with the P2PE Vendor about the Security Issue and, where possible and
permitted, share information relating to the Security Issue.



Support the P2PE Vendor’s efforts to mitigate or prevent further Security Issues.



Support the P2PE Vendor’s efforts to correct any Security Issues.



Work with the P2PE Vendor to communicate and cooperate with appropriate law
enforcement agencies to help mitigate or prevent further Security Issues.

5.6.5 Withdrawal of Acceptance
PCI SSC reserves the right to suspend, withdraw, revoke, cancel or place conditions upon its
Acceptance of (and accordingly, remove from the List of Validated P2PE Solutions, List of
Validated P2PE Components, or List of Validated P2PE Applications) any P2PE Product in
accordance with the VRA, in instances including but not limited to, if PCI SSC reasonably
determines that (a) the P2PE Product does not provide sufficient protection against current
threats and conform to the requirements of the P2PE Program, (b) the continued Acceptance of
the P2PE Product represents a significant and imminent security threat to its users, or (c) such
action is necessary in light of a related Security Issue.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 42

6

P2PE Assessor Reporting Considerations

6.1 P-ROV Acceptance Process Overview
The P2PE Assessor Company performs the P2PE Assessment in
accordance with the P2PE Standard and produces a P-ROV that is
shared with the P2PE Vendor.
When the P-ROV has all items in place, and where the P2PE Vendor
seeks to have the P2PE Product listed on the Website, the P2PE
Assessor Company submits the P-ROV and all other required
materials to PCI SSC. If the P-ROV does not have all items in place,
the P2PE Vendor must address those items, and the P2PE Assessor
must update the P-ROV prior to submission to PCI SSC.. Once the
P2PE Assessor Company is satisfied that all documented issues have
been resolved by the P2PE Vendor, the P2PE Assessor Company
submits the P-ROV and all other required materials to PCI SSC.

Note:
All P-ROVs and other
materials submitted to PCI
SSC must be in English or
with certified English
translation.

Once PCI SSC receives the P-ROV and all other required materials and applicable fees, PCI SSC
reviews the submission from a quality assurance perspective and determines whether it is acceptable.
Subsequent iterations will also be responded to, typically within 30 calendar days of receipt. If the PROV meets all applicable quality assurance requirements (as documented in the QSA Qualification
Requirements and related P2PE Program materials), PCI SSC sends a countersigned P-AOV to both
the P2PE Vendor and the P2PE Assessor Company and adds the product to the List of Validated P2PE
Solutions, List of Validated P2PE Components, or List of Validated P2PE Applications, as applicable.
PCI SSC communicates any quality issues associated with P-ROVs to the P2PE Assessor Company. It
is the responsibility of the P2PE Assessor Company to resolve those issues with PCI SSC and/or the
P2PE Vendor, as applicable. Such issues may be limited or more extensive; limited issues may simply
require updating the P-ROV to reflect adequate documentation to support the P2PE Assessor
Company’s decisions, whereas more extensive issues may require the P2PE Assessor Company to
perform further testing, requiring the P2PE Assessor Company to notify the P2PE Vendor that retesting is needed and to schedule that testing with the P2PE Vendor.
P-ROVs that have been returned to the P2PE Assessor Company for correction must be resubmitted to
the PCI SSC within 30 days of the preceding submission. If this is not possible, the P2PE Assessor
Company must inform the PCI SSC of the timeline for response. Lack of response on P-ROVs returned
to the P2PE Assessor Company for correction may result in the submission being closed. Submissions
that have been closed will not be reopened and must be resubmitted as if they are new P-ROV
submissions.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 43

6.2 Delivery of the P-ROV and Related Materials
For P2PE Solutions, P2PE Components, and P2PE Applications to be listed on the Website, all
documents required in connection with the P2PE validation process must be submitted to PCI SSC by
the P2PE Assessor Company, through a secure submissions website designated by PCI SSC (the
Portal). Council staff pre-screen Portal submissions to ensure that all required documentation has been
included and the basic submission requirements have been satisfied.
There must be consistency between the information in documents submitted for review via the Portal
and the “Details fields within the Portal. Common errors in submissions include inconsistent application
names or contact information and incomplete or inconsistent documentation. Incomplete or inconsistent
submissions may result in a significant delay in the processing of requests for listing and/or may be
rejected by PCI SSC.

6.2.1 Access to the Portal
Once a P2PE Assessor Company has had its first employee successfully complete the individual
P2PE Assessor qualification process, PCI SSC will send login credentials and instructions for use
of the Portal to the company’s Primary Contact. Additional credentials can be requested by each
company’s Primary Contact through PCI SSC’s P2PE Program Manager. Portal credentials may
be issued to any employee of a P2PE Assessor and are not limited to P2PE Assessor
Employees.

6.2.2 Resubmissions
For subsequent reviews, if multiple iterations of a P-ROV are required before PCI SSC Accepts
the report, the P2PE Assessor must submit P-ROV versions that include tracking of cumulative
changes within the document.

6.3 Assessor Quality Management Program
As stated in the Qualification Requirements – For Point-to-Point Qualified Security Assessors and the
P2PE Assessor Addendum, P2PE Assessors are required to meet all quality assurance standards set
by PCI SSC. The various phases of the assessor quality management program are described below.

6.3.1 P-ROV Submission Review
PCI SSC’s Assessor Quality Management Team (“AQM”) reviews each P-ROV submission after
the invoice for the P2PE Acceptance Fee has been paid by the P2PE Vendor. Administrative
review will be performed in “pre-screening” to ensure that the submission is complete; then an
AQM Analyst will review the submission in its entirety
The AQM Analyst will review the P2PE submission first to determine whether the candidate P2PE
Product is eligible for validation as described in the P2PE Program Guide. If there is question as
to eligibility, the AQM Analyst will contact the P2PE Assessor Company for additional information.
If the P2PE submission is determined to be ineligible for validation under the P2PE Program, the
P-ROV will be rejected. The P2PE Assessor Company will receive a letter of rejection with
optional instructions for appealing this rejection.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 44

If the P2PE submission is determined to be eligible for validation under the P2PE Program and
the submission is complete, the AQM Analyst will conduct a complete review of the P-ROV
submissions and supporting documentation provided or subsequently requested by PCI SSC.
Any comments or feedback from the AQM Analyst will be made via the Portal, and the P2PE
Assessor Company is expected to address all comments and feedback in a timely manner. The
AQM Analyst’s role is to ensure sufficient evidence and detail are present in the P2PE Assessor
Company’s submission to provide reasonable assurance that the P2PE Assessment was
performed in accordance with Program requirements and quality standards.

6.3.2 P2PE Assessor Quality Audit
The purpose of the P2PE Assessor Company audit process is to provide reasonable assurance
that the assessment of P2PE Solutions, P2PE Components, and P2PE Applications and overall
quality of report submissions remain at a level that is consistent with the objectives of the P2PE
Program Guide and supporting PCI SSC documentation.
QSA Company audits are provided for in the QSA Qualification Requirements, and P2PE
Assessor Companies are subject to audits of their work as P2PE Assessor Companies under the
QSA Qualification Requirements at any time. This may include, but not be limited to, review of
completed reports, work papers, and onsite visits with P2PE Assessor Companies to audit
internal QA programs, at the expense of the P2PE Assessor Company. Refer to the QSA
Qualification Requirements for information on PCI SSC’s audit process.

6.3.3 P2PE Assessor Company Status
The P2PE Program recognizes several status designations for P2PE Assessor Companies: “In
Good Standing,” “Remediation,” and “Revocation.” The status of a P2PE Assessor Company is
initially “In Good Standing” but may change based on quality concerns, feedback from clients
and/or Participating Payment Brands, administrative issues, or other factors. These status
designations are described further below.
Note: These status designations are not necessarily progressive: Any P2PE Assessor
Company’s status may be revoked or its P2PE Assessor Addendum (defined in the P2PE
Qualification Requirements) terminated in accordance with the P2PE Assessor Addendum; and
accordingly, if warranted, a P2PE Assessor Company may move directly from “In Good Standing”
to “Revocation.”
Nonetheless, in the absence of severe quality concerns, P2PE Assessor Companies with quality
issues are generally first addressed through the Remediation process in order to promote
improved performance.

6.3.3.1 In Good Standing
P2PE Assessor Companies are expected to maintain a status of In Good Standing while
participating in the P2PE Program. Reviews of each submission and the overall quality of
submissions are conducted by PCI SSC to detect any deterioration of quality levels over time.
P2PE Assessor Companies may also be subject to periodic audit by PCI SSC at any time.

6.3.3.2 Remediation
A P2PE Assessor Company and/or P2PE Assessor Employee may be placed into
Remediation for various reasons, including quality concerns or administrative issues—such as
failure to meet any requalification requirements, failure to submit required information, etc.
P2PE Assessor Companies in Remediation are listed on the Website in Red, indicating their
remediation status without further explanation as to why the designation is warranted.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 45

If administrative or non-severe quality problems are detected, PCI SSC will typically
recommend participation in the Remediation program. Remediation provides an opportunity
for P2PE Assessor Companies and/or Employees to improve performance by working closely
with PCI SSC staff; and in the absence of participation, quality issues may increase.
Additionally, Remediation helps to assure that the baseline standard of quality for P2PE
Assessor Companies and/or Employees is upheld. Refer to the QSA Qualification
Requirements for further detail on the Remediation Process.

6.3.3.3

Revocation

Serious quality concerns may result in revocation of
P2PE Assessor Company and/or P2PE Assessor
Employee qualification and/or termination of the P2PE
Assessor Addendum. When a P2PE Assessor Company
and/or P2PE Assessor Employee qualification is
revoked, the assessor is removed from the List of
approved P2PE Assessors and is no longer eligible to
perform P2PE Assessments, process P-ROVs, or
otherwise participate in the P2PE Program; provided that
if and to the extent approved by PCI SSC in writing, the
P2PE Assessor will be required to complete any P2PE
Assessments for which it was engaged prior to the
effective date of the Revocation.

Note:
If a P2PE Solution, P2PE
Component, or P2PE Application
included on the List of Validated
Solutions, List of Validated
Components, or List of
Validated Applications is
compromised due to P2PE
Assessor Company and/or
Employee error, that P2PE
Assessor Company and/or
Employee may immediately be
placed into Remediation or its
P2PE qualification status
revoked.

The P2PE Assessor Company and/or P2PE Assessor Employee may appeal the Revocation
but, unless otherwise approved by PCI SSC in writing in each instance, will not be permitted to
perform P2PE Assessments, process P-ROVs, or otherwise participate in the P2PE Program.
The P2PE Assessor Company and/or P2PE Assessor Employee may reapply at a later date
of two years after revocation, so long as it has demonstrated to PCI SSC's satisfaction that it
meets all applicable QSA, P2PE Assessor, and, if applicable, PA-QSA requirements, as
documented in the relevant PCI SSC program documents.

PCI P2PE Program Guide, v2.0
© PCI Security Standards Council, LLC

September 2015
Page 46

Appendix A: P2PE Products and Acceptance
Acceptance of a given P2PE Product by the PCI SSC only applies to the specific P2PE Solution, P2PE
Component, or P2PE Application that has been validated by a P2PE Assessor and subsequently
Accepted by PCI SSC (the “Accepted Product”). If any aspect of a P2PE Product is different from that
which was validated by the P2PE Assessor and Accepted by PCI SSC—even if the different P2PE
Product (the “Alternate Product”) conforms to the basic product description of the Accepted Product— the
Alternate Product should not be considered Accepted by PCI SSC, nor promoted as Accepted by PCI
SSC.
No P2PE Vendor or other third party may refer to a P2PE Product as “PCI Approved,” or “PCI SSC
Approved” or otherwise state or imply that PCI SSC has, in whole or part, approved any aspect of a P2PE
Vendor or its P2PE Product, except to the extent and subject to the terms and restrictions expressly set
forth in a written agreement with PCI SSC, or in a corresponding P-AOV provided by PCI SSC. All other
references to PCI SSC’s acceptance of a P2PE Product are strictly and actively prohibited by PCI SSC.
When granted, PCI SSC Acceptance is provided to ensure certain security and operational characteristics
important to the achievement of PCI SSC’s goals, but such acceptance does not under any
circumstances include or imply any endorsement or warranty regarding the P2PE Solution Provider or the
functionality, quality, or performance of the P2PE Product or any other product or service. PCI SSC does
not warrant any products or services provided by third parties. PCI SSC acceptance does not, under any
circumstances, include or imply any product warranties from PCI SSC, including, without limitation, any
implied warranties of merchantability, fitness for purpose or non-infringement, all of which are expressly
disclaimed by PCI SSC. All rights and remedies regarding products and services that have received
acceptance from PCI SSC shall be provided by the party providing such products or services, and not by
PCI SSC or any Participating Payment Brand.

PCI P2PE Program Guide, Appendix A
© PCI Security Standards Council, LLC

September 2015
Page 47

Appendix B: Elements for the List of Validated P2PE
Solutions
Company
This entry denotes the P2PE Solution Provider for the validated P2PE Solution.

P2PE Solution Identifier
P2PE Solution Identifiers refers to a subset of fields in the listing below the “Company” entry used by
PCI SSC to denote relevant information for each Validated P2PE Solution, consisting of the following
fields (fields are explained in detail below):
 P2PE Solution Name
 Reference Number
 Solution Details

P2PE Solution Identifier: Detail
 P2PE Solution Name
P2PE Solution Name is provided by the P2PE Solution Provider, and is the name by which the
P2PE Solution is sold.
 Reference Number
PCI SSC assigns the Reference number once the Validated P2PE Solution is posted to the
Website; this number is unique per P2PE Solution Provider and will remain the same for the life
of the listing.
An example reference number is 2015-XXXXX.XXX consisting of the following:
Field

Format

Year of listing

4 digits + hyphen

Solution Provider #

5 digits + period (assigned alphabetically initially,
then as received)

Individual Solution Number #

3 digits

 Solution Details
Clicking on this link brings up a list of details specific to this Solution consisting of the following
fields (fields are explained in detail below):


PTS Devices Supported



P2PE Application(s) Supported



P2PE Components

Solution Details: Detail
 PTS Devices Supported
This section identifies the PCI-approved POI devices validated for use with this P2PE Solution
and will include relevant PCI PTS reference numbers and the expiry date of the PTS approval for
this device. If the expiry date is in the past, this will be denoted by a color change. A website link
PCI P2PE Program Guide, Appendix B
© PCI Security Standards Council, LLC

September 2015
Page 48

will be provided to the appropriate entry on the List of Approved PIN Transaction Security
Devices.
 P2PE Applications Supported
This section identifies the P2PE Applications validated for use with this P2PE Solution and listed
on the List of Validated P2PE Applications, and will include the expiry date of the P2PE
Application’s approval.
While a P2PE Solution may include applications that were evaluated per relevant requirements in
the P2PE Standard, those are not listed within the P2PE Solution or within the List of Validated
P2PE Applications. Any use of such an application in another P2PE Product would require either
independent listing as a P2PE Application, if eligible, or assessment as part of each P2PE
Solution the application is part of.
 P2PE Components
This section identifies the P2PE Components validated for use with this P2PE Solution and listed
on the List of Validated P2PE Components, and will include the expiry date of the P2PE
Component’s approval.
While a P2PE Solution may include third-party services (including services potentially eligible for
Listing as a P2PE Component, such as CA/RA or KIF), those are not listed within the P2PE
Solution or within the List of Validated P2PE Components. Any use of such a component in
another P2PE Product would require either independent listing as a P2PE Component, if eligible,
or assessment as part of each P2PE Solution the application is part of.

P2PE Version
“P2PE Version” is used by PCI SSC to denote the standard, and the specific version thereof, used to
assess the compliance of a Validated P2PE Solution.

P2PE Assessor
This entry denotes the name of the qualified P2PE Assessor Company that performed the validation
and determined that the P2PE Solution is compliant with the P2PE Standard.

Regions Served
This section allows for the submission of a description of geographic regions in which this P2PE
Solution is available—e.g., Europe, Asia-Pacific.

Reassessment Date
The Reassessment Date for Validated P2PE Solution is the date by which the P2PE Solution Provider
must have the P2PE Solution re-evaluated against the current P2PE Standard in order to maintain the
Acceptance.

Description Provided by Solution Provider
This section allows for the Solution Provider’s submission in the Portal via the QSA (P2PE) of a
description for the P2PE Solution to be used in the List of Validated P2PE Solutions, should the
Solution P-ROV be Accepted.

PCI P2PE Program Guide, Appendix B
© PCI Security Standards Council, LLC

September 2015
Page 49

Appendix C: Elements for the List of Validated P2PE
Components
There are four recognized types of Component Providers for the List of Validated Components, which are
represented across the top of the List of Validated Components – Encryption-management services
(“Encryption Mgmt”), Decryption-management services (“Decryption Mgmt”), Certification
Authority/Registration Authority Services (CAs/RAs), and Key-Injection facility services (“KIFs”). Each
contain the same listing elements below:

Company
This entry denotes the P2PE Component Provider for the Validated P2PE Component.

P2PE Component Identifiers
P2PE Component Identifier refers to a subset of fields in the listing below the “Company” entry used
by PCI SSC to denote relevant information for each Validated P2PE Component, consisting of the
following fields (fields are explained in detail below):


P2PE Component Name



Reference Number



Component Details

P2PE Component Identifier: Detail


P2PE Component Name
P2PE Component Name is provided by the P2PE Component Provider, and is the name by which
the P2PE Component Provider’s services are known.



Reference Number
PCI SSC assigns the Reference number once the Validated P2PE Component is posted to the
Website; this number is unique per P2PE Component Provider and will remain the same for the
life of the listing.
An example reference number is 2015-XXXXX.XXX consisting of the following:



Field

Format

Year of listing

4 digits + hyphen

Component Provider #

5 digits + period (assigned alphabetically initially,
then as received)

Individual Component Number #

3 digits

Component Details

PCI P2PE Program Guide, Appendix C
© PCI Security Standards Council, LLC

August 2015
Page 50

Clicking on this link brings up a list of details specific to
this Component consisting of the following fields (fields
are explained in detail below):


PTS Devices Supported



P2PE Application(s) Supported



P2PE Components

Note:
Not all component details will
apply, as each component
service is different. For example,
Encryption-management
services may have PTS Devices
Supported, others likely will not.

Component Details: Detail


PTS Devices Supported
This section identifies the PCI-approved POI devices validated for use with this P2PE Component
and will include relevant PCI PTS reference numbers and the expiry date of the PTS approval for
this device. If the expiry date is in the past, this will be denoted by a color change. A website link
will be provided to the appropriate entry on the List of Approved PIN Transaction Security
Devices.



P2PE Applications Supported
This section identifies the P2PE Applications validated for use with this P2PE Component
and listed on the List of Validated P2PE Applications, and will include the expiry date of the
P2PE Application’s approval.



P2PE Components
This section identifies the P2PE Components validated for use with this P2PE Component
and listed on the List of Validated P2PE Components, and will include the expiry date of the
P2PE Component’s approval.
While a P2PE Component may include third-party services (including those offering services
potentially eligible for Listing as a P2PE Component, such as CA/RA or KIF), those are not
listed within the P2PE Component or within the List of Validated P2PE Components. Any use
of such a component in another P2PE Product would require either independent listing as a
P2PE Component, if eligible, or assessment as part of each P2PE Solution the application is
part of.

P2PE Version
“P2PE Version” is used by PCI SSC to denote the standard, and the specific version thereof, used to
assess the compliance of a Validated P2PE Component.

P2PE Assessor
This entry denotes the name of qualified P2PE Assessor Company that performed the validation and
determined that the P2PE Component is compliant with the P2PE Standard.

Reassessment Date
The Reassessment Date for Validated P2PE Component is the date by which the P2PE Component
Provider must have the P2PE Component re-evaluated against the current P2PE Standard in order to
maintain the Acceptance.

PCI P2PE Program Guide, Appendix C
© PCI Security Standards Council, LLC

August 2015
Page 51

Description Provided by Component Provider
This section allows for the Component Provider’s submission in the Portal via the QSA (P2PE) of a
description of the P2PE Component to be used in the List of Validated P2PE Components, should the
Component P-ROV be Accepted.

PCI P2PE Program Guide, Appendix C
© PCI Security Standards Council, LLC

August 2015
Page 52

Appendix D: Elements for the List of Validated P2PE
Applications
Company
This entry denotes the P2PE Application Vendor for the Validated P2PE Application.

P2PE Application Identifiers
P2PE Application Identifiers refers to a subset of fields in the listing below the Company entry used
by PCI SSC to denote relevant information for each Validated P2PE Application, consisting of the
following fields (fields are explained in detail below):


P2PE Application Name



P2PE Application Version #



Reference Number



Application Details

P2PE Application Identifier: Detail


P2PE Application Name
P2PE Application Name is provided by the Application Vendor, and is the name by which the
application is sold. The Application Name cannot contain any variable characters.



P2PE Application Version #
P2PE Application Version # represents the specific application version reviewed in the P2PE
Application Assessment. The format of the version number:





Is set by the vendor,

Note:



May consist of a combination of alphanumeric
characters and



Must be consistent with the Application Vendor’s
published versioning methodology for this product as
documented in the P2PE Application Implementation
Guide.

See Appendix H: P2PE
Application Software Versioning
Methodology for details about
content to include in the
Application P-ROV and P2PE
Application Implementation
Guide for the Application
Vendor’s versioning methods.

Reference Number
PCI SSC assigns the Reference number once the Validated P2PE Application is posted to the
Website; this number is unique per Application Vendor and will remain the same for the life of the
listing.
An example reference number is 2015-XXXXX.XXX.AAA, consisting of the following:
Field

Format

Year of listing

4 digits + hyphen

Application Vendor #

5 digits + period (assigned alphabetically initially,
then as received)

Application Vendor App #

3 digits (assigned as received)

Minor version

3 alpha characters (assigned as received)

PCI P2PE Program Guide, Appendix D
© PCI Security Standards Council, LLC

September 2015
Page 53



Application Details
Clicking on this link brings up a list of details specific to this Component consisting of the
following fields (fields are explained in detail below):


PTS Devices Supported

Application Details: Detail


PTS Devices Supported
This section identifies the PCI-approved POI devices validated for use with this P2PE Application
and will include relevant PCI PTS reference numbers and the expiry date of the PTS approval for
this device. If the expiry date is in the past, this will be denoted by a color change. A website link
will be provided to the appropriate entry on the List of Approved PIN Transaction Security
Devices.

P2PE Version
“P2PE Version” is used by PCI SSC to denote the standard, and the specific version thereof, used to
assess the compliance of a Validated P2PE Application.

P2PE Assessor
This entry denotes the name of qualified PA-QSA (P2PE) Assessor Company that performed the
validation and determined that the application is compliant with the P2PE Standard.

Reassessment Date
The Reassessment Date for Validated P2PE Application is the date by which the P2PE Application
Vendor must have the application re-evaluated against the current P2PE Standard in order to maintain
Acceptance.

Description Provided by Application Vendor
This section allows for the Application Vendor’s submission in the Portal via the PA-QSA (P2PE) of a
description of the P2PE Application that is to be used in the List of Validated P2PE Applications should
the Application P-ROV be Accepted. This must be a factual description of the application functionality.
The description must not:


Contradict any PCI SSC program or requirement.



Make misleading claims about the application.



Claim the application is valid under another PCI SSC program or standard.

PCI SSC recommends keeping the description concise and including only pertinent information about
the application. All descriptions must be acceptable to PCI SSC, which reserves the right to modify any
description at any time.

PCI P2PE Program Guide, Appendix D
© PCI Security Standards Council, LLC

September 2015
Page 54

Appendix E: Change Impact Template for P2PE Solutions
This P2PE Change Impact Template is required for Administrative Change and Designated Change submissions for P2PE Solution listings.
Always refer to the applicable P2PE Program Guide for information on any P2PE listing changes.
The P2PE Vendor and/or P2PE Assessor Company must complete each section of this document and all other required documents based on the
type of change. The P2PE Assessor Company is required to submit this P2PE Change Impact along with supporting documentation to PCI SSC
for review.

Part 1. P2PE Listing Details, Contact Information, and Change Type
P2PE Listing Details
P2PE Solution Name
Type of Change
(Please check)

Validated Listing
Reference #
Administrative (Complete Part 2)

Delta (Complete Part 3)

Submission Date

P2PE Vendor Contact Information
Contact Name

Title/Role

Contact E-mail

Contact Phone
QSA (P2PE) Contact Information

Contact Name

Title/Role

Contact E-mail

Contact Phone

PCI P2PE Program Guide, Appendix E
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 55

Part 2. Details for Administrative Change (if indicated at Part 1)
Administrative Change Revision
Current Company Name

Revised Company Name
(if applicable)

Current P2PE Solution Name

Revised P2PE Solution Name
(if applicable)

Additional details, as applicable

Part 3. Details for Designated Change (if indicated at Part 1)
Designated Change Revision
Identify the type of designated changes applicable to this submission and complete the appropriate sections of this P2PE Change Impact
Template (check all that apply).
Please refer to the P2PE Program Guide for details about each type of designated change.
Add/Remove POI Device Type
(Complete Part 3a)

Add

Remove

Add/Remove P2PE Application
(Complete Part 3b)

Add

Remove

Add/Remove P2PE Component
(Complete Part 3c)

Application Version Number:
Add

Remove

Description of changes to the P2PE Solution or P2PE
Component:
Description of how Designated Change impacts the P2PE
Solution’s functionality
Additional details, as applicable

PCI P2PE Program Guide, Appendix E
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 56

Part 3a. Add/Remove POI Device Type (if indicated at Part 3)
POI Device Type
Adding for inclusion in listing or removal from
listing?

Addition/Inclusion in listing
(Red-lined P-ROV review required, see
details below)

Removal from listing
(No Red-lined P-ROV review required)

POI Device type name/identifier
POI Device manufacturer, model, and number
PTS approval number for POI Device
POI Device Hardware version #
POI Device Firmware version #
Perform a red-lined P-ROV review for the added Device using the table below as a minimum set of testing procedures.
P2PE Requirements (including all testing procedures)
All of 1A-1.1
1B -1.1
1B-2.2
1B-2.3
1C-2
3C-1

PCI P2PE Program Guide, Appendix E
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 57

Part 3b. Add/Remove P2PE Application (if indicated at Part 3)
P2PE Applications
Adding for inclusion in listing or removal from
listing?

Application Name

Application
version #

Addition/Inclusion in listing
(Red-lined P-ROV review required, see
details below)

Application
vendor name

Application
reference #

Removal from listing
(No Red-lined P-ROV review required)

Brief description of Application
function/purpose

POI Device type
name/identifier Application
is installed on

Perform a red-lined P-ROV review for the added Application using the table below as a minimum set of testing procedures.
P2PE Requirements (including all testing procedures)
1A-2.1
1A-2.2
1B-1.1.1
1B-3.2
1C-1.1
1C-1.2
All of 1D-1
1D-2.1

PCI P2PE Program Guide, Appendix E
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 58

Part 3c. Add/Remove P2PE Component (if indicated at Part 3)
P2PE Component
Adding for inclusion in listing or removal from
listing?

P2PE Component Provider
Name

Addition/Inclusion in listing
(Red-lined P-ROV review required, see
details below)

Removal from listing
(No Red-lined P-ROV review required)

Type of P2PE Component (select only one)
KIF

CA/RA

Encryption Mgmt.

Decryption Mgmt.

SSC Listing Number

Perform a red-lined P-ROV review for the added P2PE Component using the table below as a minimum set of testing procedures.
P2PE Requirements (including all testing procedures)
All of 3A-1
3A-2 (as applicable)
All of 3B-1
3C-1 (as applicable)

PCI P2PE Program Guide, Appendix E
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 59

Appendix F: Change Impact Template for P2PE Components
This P2PE Change Impact Template is required for Administrative Change and Designated Change submissions for P2PE Component listings.
Always refer to the applicable P2PE Program Guide for information on any P2PE listing changes.
The P2PE Vendor and/or P2PE Assessor Company must complete each section of this document and all other required documents based on the
type of change. The P2PE Assessor Company is required to submit this P2PE Change Impact along with supporting documentation to PCI SSC
for review.

Part 1. P2PE Listing Details, Contact Information, and Change type
P2PE Listing Details
P2PE Component Provider
Name

Type of Change
(Please check)

Type of P2PE Component (select only one)
KIF

CA/RA

Administrative (Complete Part 2)

Encryption Mgmt.

Decryption Mgmt.

SSC Listing Number

Delta (Complete Part 3)

Submission Date

P2PE Vendor Contact Information
Contact Name

Title/Role

Contact E-mail

Contact Phone
QSA (P2PE) Contact Information

Contact Name

Title/Role

Contact E-mail

Contact Phone

PCI P2PE Program Guide, Appendix F
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 60

Part 2. Details for Administrative Change (if indicated at Part 1)
Administrative Change Revision
Current Company Name

Revised Company Name
(if applicable)

Current P2PE Component Name

Revised P2PE Component Name
(if applicable)

Additional details, as applicable

Part 3. Details for Designated Change (if indicated at Part 1)
Designated Change Revision
Identify the type of designated changes applicable to this submission and complete the appropriate sections of this P2PE Change Impact
Template (check all that apply).
Please refer to the P2PE Program Guide for details about each type of designated change.
Add/Remove POI Device Type
(Complete Part 3a)

Add

Remove

Add/Remove P2PE Application *
(Complete Part 3b)

Add

Remove

Add/Remove P2PE Component
(Complete Part 3c)

Version Number of the Application:
Add

Remove

Description of changes to the P2PE
Component:
Description of real or potential impact to the
P2PE Solution(s) it is used in
Additional details, as applicable

PCI P2PE Program Guide, Appendix F
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 61

Part 3a. Add/Remove POI Device Type (if indicated at Part 3)
POI Device Type
Adding for inclusion in listing or removal from
listing?

Addition/Inclusion in listing
(Red-lined P-ROV review required, see
details below)

Removal from listing
(No Red-lined P-ROV review required)

POI Device type name/identifier
POI Device manufacturer, model, and number
PTS approval number for POI Device
POI Device Hardware version #
POI Device Firmware version #

Perform a red-lined P-ROV review for the added Device using the table below as a minimum set of testing procedures.
P2PE Requirements (including all testing procedures)
All of 1A-1.1
1B -1.1
1B-2.2
1B-2.3
1C-2

PCI P2PE Program Guide, Appendix F
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 62

Part 3b. Add/Remove P2PE Application (if indicated at Part 3)
P2PE Applications
Adding for inclusion in listing or removal from
listing?

Application Name

Application
version #

Addition/Inclusion in listing
(Red-lined P-ROV review required, see
details below)

Application
vendor name

Application
reference #

Removal from listing
(No Red-lined P-ROV review required)

Brief description of Application
function/purpose

POI Device type
name/identifier Application
is installed on

Perform a red-lined P-ROV review for the added Application using the table below as a minimum set of testing procedures.
P2PE Requirements (including all testing procedures)
1A-2.1
1A-2.2
1B-1.1.1
1B-3.2
1C-1.1
1C-1.2
All of 1D-1
1D-2.1

PCI P2PE Program Guide, Appendix F
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 63

Part 3c. Add/Remove P2PE Component (if indicated at Part 3)
P2PE Component
Adding for inclusion in listing or removal from
listing?

P2PE Component Provider
Name

Addition/Inclusion in listing
(Red-lined P-ROV review required, see
details below)

Removal from listing
(No Red-lined P-ROV review required)

Type of P2PE Component (select only one)
KIF

CA/RA

Encryption Mgmt.

Decryption Mgmt.

SSC Listing Number

Perform a red-lined P-ROV review for the added P2PE Component using the table below as a minimum set of testing procedures.
P2PE Requirements (including all testing procedures)
All of 3A-1
3A-2 (as applicable)
All of 3B-1
3C-1 (as applicable)

PCI P2PE Program Guide, Appendix F
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 64

Appendix G: Change Impact Template for P2PE Applications
This P2PE Change Impact Template is required for Administrative Change and Delta Change submissions for P2PE Application listings. Always
refer to the applicable P2PE Program Guide for information on any P2PE listing changes.
The P2PE Application Vendor and/or P2PE Assessor Company must complete each section of this document and all other required documents
based on the type of change (see Table 5.2.b – Changes to P2PE Listings for Applications). The P2PE Assessor Company is required to submit
this P2PE Change Impact along with supporting documentation to PCI SSC for review.

Part 1. P2PE Application Details, Contact Information, and Change type
P2PE Application Details
P2PE Application Name

Validated Listing Reference #

P2PE Application Version #:

Revised P2PE Application
Version
(if applicable)

Type of Change
(Please check)

Administrative (Complete Part 2)

Delta (Complete Part 3)

Submission Date

P2PE Application Vendor Contact Information
Contact Name

Title/Role

Contact E-mail

Contact Phone
PA-QSA (P2PE) Contact Information

Contact Name

Title/Role

Contact E-mail

Contact Phone

PCI P2PE Program Guide, Appendix G
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 65

Part 2. Details for Administrative Change (if indicated at Part 1)
Administrative Change Revision
Current Company Name

Revised Company Name
(if applicable)

Current P2PE Application Name

Revised P2PE Application Name
(if applicable)

Current P2PE Application Version

Revised P2PE Application
Version (if applicable)

Description of how this change is reflected in
the Vendor’s versioning methodology, including
how this version number indicates the type of
change
Additional details, as applicable:

PCI P2PE Program Guide, Appendix G
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 66

Part 3. Details for Delta Change (if indicated at Part 1)
For each change eligible for Delta Assessment, provide the following information. Any that impact P2PE Requirements must be reflected in the
red-lined P-ROV submitted. Use additional pages and/or add rows if needed.
Delta Change – Change Summary
Add/Remove POI Device Type
(Complete Part 3a)

Add

Remove

Not Applicable

Additional details, as applicable:
Change
Number

Detailed description of the
change

Description of why the
change is necessary

PCI P2PE Program Guide, Appendix G
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

Description of how P2PE
functionality is impacted

Description of how P2PE
Domain 2 Requirements/subRequirements are impacted

September 2015
Page 67

Part 3a. Add/Remove POI Device Type (if indicated at Part 3)
POI Device Type
Adding for inclusion in listing or removal from
listing?

Addition/Inclusion in listing
(Red-lined P-ROV review required, see
details below)

Removal from listing
(No Red-lined P-ROV review required)

POI Device type name/identifier
POI Device manufacturer, model, and number
PTS approval number for POI Device
POI Device Hardware version #
POI Device Firmware version #

Perform a red-lined P-ROV review for the added Device using the table below as a minimum set of testing procedures.
P2PE Requirements (including all testing procedures)
All of 1A-1.1
1B -1.1
1B-2.2
1B-2.3
1C-2

PCI P2PE Program Guide, Appendix G
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 68

Appendix H: P2PE Application Software Versioning
Methodology
P2PE Application Vendors are required to document and follow a software versioning methodology as
part of their system development lifecycle. Additionally, P2PE Application Vendors must communicate the
versioning methodology to their customers and integrators/resellers in the P2PE Application
Implementation Guide. Customers and integrators/resellers require this information to understand which
version of the application they are using and the types of changes that have been made to each version
of the application. P2PE Assessor Companies are required to verify the P2PE Application Vendor is
adhering to the documented versioning methodology and the requirements of the P2PE Program Guide
as part of the P2PE Assessment. Note that if a separate version-numbering scheme is maintained
internally by the P2PE Application Vendor, a method to accurately map the internal version numbers to
the publically listed version number(s) must be documented and maintained by the P2PE Application
Vendor.

H.1 Version Number Format
The format of the application version number is set by the P2PE Application Vendor and may be
comprised of several elements. The versioning methodology and the P2PE Application Implementation
Guide must fully describe the format of the application version number including the following:
 The format of the version scheme, including:


Number of elements



Numbers of digits used for each element



Format of separators used between elements



Character set used for each element (consisting of alphabetic, numeric, and/or
alphanumeric characters)

 The hierarchy of the elements


Definition of what each element represents in the version scheme



Type of change: major, minor, maintenance release, wildcard, etc.

 The definition of elements that indicate any use of wildcards
 The specific details of how wildcards are used in the versioning methodology

H.2 Version Number Usage
All changes to the P2PE Application must result in a new application version number. However,
whether this affects the version number listed on the Website depends on the nature of the change and
the P2PE Application Vendor’s published versioning methodology (see Section H.3, “Wildcards,”
below). All changes that impact security functionality and/or any P2PE Requirements must result in a
change to the version number listed on the Website; wildcards are not permitted for changes impacting
security functionality and/or any P2PE Requirements.
The P2PE Application Vendor must document how elements of the application version number are
used to identify:
 Types of changes made to the application—e.g., major release, minor release, maintenance
release, wildcard, etc.
 Changes that have no impact on the functionality of the application or its dependencies

PCI P2PE Program Guide, Appendix H
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 69

 Changes that have impact on the application functionality but no impact on security or P2PE
Requirements
 Changes that impact any security functionality or P2PE Requirement
Elements of the version number used for non-security-impacting changes must never be used for
security-impacting changes.
If the P2PE Application Vendor uses a versioning scheme that involves mapping of internal version
numbers to external, published version numbers, all security-impacting changes must result in an
update to the external, published version number.
Any version number that is accessible to customers and integrator/resellers must be consistent with the
versioning methodology described in the P2PE Application Implementation Guide.
P2PE Application Vendors must ensure traceability between application changes and version numbers
such that a customer or integrator/reseller may determine which changes are included in the specific
version of the application they are running.

H.3 Wildcards
A “wildcard” element is a variable character that may be substituted for a defined subset of possible
characters in an application versioning scheme. In the context of P2PE Applications, wildcards can
optionally be used to represent non-security-impacting changes between each version represented by
the wildcard element. A wildcard is the only variable element of the P2PE Application Vendor’s version
scheme. Use of a wildcard element in the versioning scheme is optional and is not required in order for
the P2PE Application to be P2PE validated. The use of wildcard elements is permitted subject to the
following:
a. Wildcard elements may only be used for No Impact changes, which have no impact on
security and/or any P2PE requirements.
b. The use of wildcard elements is limited to the rightmost (least significant) portion of the
version number. For example, 1.1.x represents acceptable usage. A version methodology
that includes a wildcard element followed by a non-wildcard element is not permitted. For
example, 1.x.1 and 1.1.y.1 represent usage that is not permitted.
c.

All security-impacting changes must result in a change to the non-wildcard portion of the
application version number and will therefore result in an update to the version number
listed on the Website.

d. Wildcard elements must not precede version elements that could represent securityimpacting changes; version elements reflecting a security-impacting change must appear
“to the left of” the first wildcard element.
e. All wildcard usage must be pre-defined and documented in the P2PE Application
Vendor’s versioning methodology and the P2PE Application Implementation Guide.
f.

All wildcard usage must be consistent with that validated by the P2PE Assessor
Company as part of the P2PE Assessment of the P2PE Application.

PCI P2PE Program Guide, Appendix H
© 2015 PCI Security Standards Council, LLC. All Rights Reserved.

September 2015
Page 70



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : No
Page Count                      : 71
Language                        : en-US
Tagged PDF                      : Yes
Creator                         : Microsoft® Word 2013
Create Date                     : 2015:09:24 14:28:01-04:00
Modify Date                     : 2015:09:24 14:28:01-04:00
Producer                        : Microsoft® Word 2013
EXIF Metadata provided by EXIF.tools

Navigation menu