PCI DSS Encryption Requirements: Protecting Cardholder Data at Rest and in Transit | Lorikeet Security Skip to main content
Back to Blog

PCI DSS Encryption Requirements: Protecting Cardholder Data at Rest and in Transit

Lorikeet Security Team February 28, 2026 10 min read

Encryption is the last line of defense for cardholder data. If an attacker bypasses your network segmentation, evades your monitoring, and gains access to your storage systems, encryption determines whether they get usable card numbers or ciphertext.

PCI DSS addresses encryption in two requirements: Requirement 3 covers stored cardholder data (data at rest), and Requirement 4 covers data transmitted across open, public networks (data in transit). Both underwent significant clarification in v4.0.


Requirement 3: Protecting Stored Data

The first principle of Requirement 3 is to minimize stored cardholder data. If you do not store it, you do not need to protect it. Before implementing encryption, evaluate whether you need to store the PAN at all. Tokenization can replace stored PANs with non-sensitive tokens, dramatically reducing your compliance scope.

What must be rendered unreadable

Requirement 3.5 mandates that the PAN is rendered unreadable anywhere it is stored, using one of these methods:

Method Reversible Use Case Considerations
Encryption (AES) Yes, with key Need to retrieve original PAN Requires key management program
Tokenization Via token vault Reference data without storing PAN Token vault is in CDE scope
Hashing No Verification only, not retrieval Must be keyed (HMAC) to prevent attacks
Truncation No Display/receipt purposes Max first 6 + last 4 digits shown

Key Management

Encryption without proper key management is security theater. If the encryption keys are stored alongside the encrypted data, or if key access is not controlled, the encryption provides no meaningful protection.

Requirement 3.6 and 3.7 mandate a complete cryptographic key management program:

Full-disk encryption caveat: Full-disk encryption (such as BitLocker or LUKS) protects data when the disk is physically removed, but does not protect data when the system is running. PCI DSS requires that PANs be rendered unreadable at the application or database level, not just at the disk level. Full-disk encryption alone does not satisfy Requirement 3.5 for systems that are operational.


Requirement 4: Protecting Data in Transit

Requirement 4 mandates that cardholder data transmitted across open, public networks is protected with strong cryptography. This means TLS 1.2 or higher for all transmissions of cardholder data over the internet, wireless networks, or any other network that could be intercepted.

TLS requirements

Requirement 4 applies to all channels: web traffic, API communications, email containing cardholder data, file transfers, and any other transmission. Internal network traffic between CDE systems should also use encryption, even though Requirement 4 technically applies to "open, public networks." Best practice and many QSAs expect internal encryption as well.


Common Encryption Failures

Need encryption assessment for PCI DSS?

Our penetration tests evaluate your encryption implementation, key management practices, and TLS configurations. Get your Requirements 3 and 4 validated before your QSA assessment.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!