0 - Table of Contents
DynaFlex II Go| Secure Card Reader | PCI PTS POI v6.2 Security Policy
Page 4 of 18 (D998200596-100)
Table of Contents
Table of Contents .............................................................................................................................................. 4
1Purpose ...................................................................................................................................................... 5
2General Description.................................................................................................................................. 6
2.1 Product Name and Appearance..................................................................................................... 6
2.2 Product Type ..................................................................................................................................... 7
2.3 Identification ..................................................................................................................................... 7
2.3.1 Hardware Identification .......................................................................................................... 7
2.3.2 Firmware Identification.........................................................................................................10
3Installation and User Guidance ............................................................................................................11
3.1 Initial Inspection .............................................................................................................................11
3.2 Installation.......................................................................................................................................11
3.3 Environmental Conditions.............................................................................................................11
3.4 Communications and Security Protocols ...................................................................................12
3.5 Configuration Settings................................................................................................................... 12
4Operation and Maintenance .................................................................................................................13
4.1 Periodic Inspection.........................................................................................................................13
4.2 Self-Test ...........................................................................................................................................14
4.3 Roles and Responsibilities............................................................................................................ 14
4.4 Passwords and Certificates ..........................................................................................................14
4.5 Tamper Response ..........................................................................................................................14
4.6 Patching and Updating ..................................................................................................................15
4.7 Decommissioning........................................................................................................................... 15
5Security..................................................................................................................................................... 16
5.1 Account Data Protection ...............................................................................................................16
5.2 Algorithms Supported.................................................................................................................... 16
5.3 Key Management ........................................................................................................................... 16
5.4 Key Loading..................................................................................................................................... 16
5.5 Key Replacement ...........................................................................................................................16
6Acronyms .................................................................................................................................................17
Appendix A References..............................................................................................................................18