3.5.1 Additional requirement for service providers only: Maintain a documented description of the cryptographic architecture that includes:

3.5.1 Additional requirement for service providers only: Maintain a documented description of the cryptographic architecture that includes:
• Details of all algorithms, protocols, and keys used for the protection of cardholder data, including key strength and expiry date
• Description of the key usage for each key
• Inventory of any HSMs and other SCDs used for key management

3.5.1 Interview responsible personnel and review documentation to verify that a document exists to describe the cryptographic architecture, including:
• Details of all algorithms, protocols, and keys used for the protection of cardholder data, including key strength and expiry date
• Description of the key usage for each key
• Inventory of any HSMs and other SCDs used for key management

Note: This requirement applies only when the entity being assessed is a service provider.

Maintaining current documentation of the cryptographic architecture enables an entity to understand the algorithms, protocols, and cryptographic keys used to protect cardholder data, as well as the devices that generate, use and protect the keys. This allows an entity to keep pace with evolving threats to their architecture, enabling them to plan for updates as the assurance levels provided by different algorithms/key strengths changes. Maintaining such documentation also allows an entity to detect lost or missing keys or key-management devices, and identify unauthorized additions to their cryptographic architecture.