0 - Table of Contents
DynaFlex II PED| PIN Entry Device | PCI PTS POI v6.2 Security Policy
Page 4 of 24 (D998200520-15)
Table of Contents
Table of Contents .............................................................................................................................................. 4
1Purpose ...................................................................................................................................................... 5
2General Description.................................................................................................................................. 6
2.1 Product Name and Appearance..................................................................................................... 6
2.2 Product Type ..................................................................................................................................... 8
2.3 Identification ..................................................................................................................................... 8
2.3.1 Hardware Identification .......................................................................................................... 8
2.3.2 Firmware Identification.........................................................................................................11
2.3.3 Device Information Page ...................................................................................................... 12
3Installation and User Guidance ............................................................................................................14
3.1 Initial Inspection .............................................................................................................................14
3.2 Installation.......................................................................................................................................15
3.3 Environmental Conditions............................................................................................................. 15
3.4 Communications and Security Protocols ...................................................................................16
3.5 Configuration Settings................................................................................................................... 16
4Operation and Maintenance .................................................................................................................17
4.1 Periodic Inspection.........................................................................................................................17
4.2 Self-Test ...........................................................................................................................................18
4.3 Roles and Responsibilities............................................................................................................18
4.4 Passwords and Certificates ..........................................................................................................18
4.5 Tamper Response .......................................................................................................................... 18
4.6 Privacy Shield..................................................................................................................................19
4.7 Patching and Updating ..................................................................................................................20
4.8Decommissioning...........................................................................................................................20
5Security..................................................................................................................................................... 21
5.1 Account Data Protection ...............................................................................................................21
5.2 Algorithms Supported....................................................................................................................21
5.3 Communications ............................................................................................................................21
5.4 Key Management ........................................................................................................................... 21
5.5 Key Loading..................................................................................................................................... 22
5.6 Key Replacement ........................................................................................................................... 22
6Acronyms .................................................................................................................................................23
Appendix A References..............................................................................................................................24