Tokenization Flashcards

Banks and Fintechs (46 cards)

1
Q

What is required for tokenization systems to be PCI-compliant

A

A tokenization system must:

  • Replace the PAN with a non-sensitive token.
  • Ensure the token cannot be mathematically reversed.
  • Protect the mapping between PAN and token in a secured, PCI -scoped vault
  • Use strong cryptography and controls for the vault.
  • Restrict access to the tokenization system.
  • Use secure APIs and encryption in transit and at rest.
  • Maintain full PCI controls for the token vault environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False? Systems using tokens instead of PAN are out of PCI scope?

A

False. Use of tokens reduces the PCI scope for an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False? A token vault is considered in-scope for PCI DSS.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False? Tokenization eliminates PCI DSS obligations?

A

False, the vault environment must still meet full PCI DSS controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is tokenization?

A

Tokenization is a security technique that replaces sensitive data (such as a card number) with a non-sensitive, irreversible substitute called a token.

A token has no exploitable mathematical relationship to the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How would tokenization work in a payment product? Please map out the steps.

A
  1. Customer enters card number on a secure, PCI-compliant payment form.
  2. The payment processor securely sends the PAN to a PCI Level 1 token vault.
  3. Vault creates a token.
  4. Merchant/platform receives only the token…not the card number.
  5. The real PAN stays encrypted in the provider’s vault and never touches the merchant’s systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the various types of tokens?

A
  • Vault tokens (most secure)
  • Network tokens (Visa/Mastercard lifecycle tokens)
  • Single-use tokens
  • Multi-use tokens
  • Device tokens (Apple & Google Pay)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False? Tokenization encrypts the PAN?

A

False, encryption is a separate process from tokenization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is network tokenization?

A

Network tokenization is a type of tokenization performed by the card networks themselves (Visa, Mastercard, Amex, Discover). The PAN is replaced with a card network-issued token than can be used across merchants, devices, and channels with higher security and better authorization rates.

It is different from vault tokenization which is done by processors like Stripe and Adyen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is account updater and how does it work.

A

Account updater is a PAN lifecycle management feature for cardholders. It leverages network tokenization to always ensure that your card is available.

If the consumer’s card expires are gets replaced:
- the token continues to work
- the merchant doesn’t need to update stored payment methods
- Reduces churn and dropped subscriptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False? Network tokens are more secure and dynamic the vault tokens.

A

True, network tokens are used for payment optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False? Vault tokens reduce the scope of PCI compliance.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which entities are more likely to use vault tokens in fintechs?

A

Payment processors and payment gateways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False? Either encryption or tokenization should be used to protect payment data. Both are not needed.

A

False. Both should be used in security solutions designed to protect data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does encryption work?

A

Encryption works by making changes in the type and length of data that renders that information as unreadable in databases and other intermediate systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What benefit does tokenization have over encryption methods?

A
  • Tokenization is able to be processed by legacy systems.
  • Consumes much less computational resources during processing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the 3 types of tokens in fintech?

A
  • High-value tokens
  • Low-value tokens
  • Security tokens
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a high-value token (HVT)?

A

An HVT, is a tokenized representation of a card or bank account that:

  • can be used to charge a customer
  • Maps back to the real payment instrument (via a secure vault)
  • Is reversible by the payment processor
  • Has monetary value because it can trigger payments

Since it can move money, it is considered high-value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a low-value token (LVT)?

A

A low-value token is a tokenized identifier that:

  • Cannot be decrypted back to the PAN
  • Cannot be used to authorize a transaction
  • Carries no financial value
  • Is safe to store outside the PCI cardholder data environment
  • Exist only as a reference ID, customer ID, or metadata object.

Since is cannot perform payment functions, it’s considered low risk and often out of PCI scope.

20
Q

What are the typical uses for a low-value token?

A
  • Customer profiles
  • Order history
  • Storing which payment method was used (without PAN)
  • Linking transactions to CRM records
  • Internal analytics

These tasks require referencing a payment method, but not performing payments.

21
Q

What are typical uses for a high-value token?

A
  • Run charges
  • Authorize holds
  • Process refunds
  • Run recurring billing
22
Q

What is a security token?

A

A security token is a digital credential that proves identity or access rights and is used to authenticate a user or device in a secure system.

23
Q

When would a security token be used?

A
  • One-time password (OTP)
  • YubiKey / RSA SecurID
  • Authenticator App (TOTP)
  • Smart cards
  • FIDO2 Keys
24
Q

What is the purpose of a security token?

A
  • Provide strong authentication
  • Protect logins with MFA
  • Ensure only authorized users access systems.
25
True or False? Tokenization is used for ACH payments to protect account numbers?
True
26
When an authorization request is processed for a payment card, what is returned to the merchant instead of the actual card number
Token
27
What is the central repository for PANs and their tokens in a tokenization system? It is used in the mapping process.
Card Data Vault
28
What is token mapping?
Token mapping is the secure association between a token and the original sensitive data it represents, stored inside a token vault so the token be used for payments without exposing the real card number.
29
In payments, what is a prime target for cybersecurity criminals?
Card Data Vault
30
What is a single-use token in payments?
A single-use token is a temporary, one-time token generated by a payment processor to replace sensitive card data for a single authorization or payment attempt. After the transaction is completed or expired, the token is destroyed or rendered unusable.
31
What is a multi-use token in payments?
A multi-use token is a persistent token generated by a payment processor that: - Can be used for multiple transactions - Supports recurring billing, subscriptions, and stored payment methods. - Maps back to the real card in a PCI Level 1 token vault - Does not expose the card number to the merchant. It remains valid until the merchant or customer remove it.
32
What type of tokenization allows multiple tokens, each used in different domains, to all map back to the same real card in a central token vault?
Cross-domain tokenization
33
True or False? In cross-domain tokenization, each token is isolated to its domain for security?
False. A cross-domain token is a network-generated payment token that replaces the PAN and can be securely used across multiple environments (e-commerce, in-app, mobile wallet, POS) while keeping the card number protected and reducing PCI scope.
34
What is cross-domain tokenization?
Cross-domain tokenization allows a single secure token to be used across multiple domains (such as e-commerce, in-app, mobile wallet, and POS) while the real PAN is stored in a secure vault. This enables interoperable payments without exposing card data.
35
What are 3 potential risky tokenization solutions?
- cross-domain tokenization - token commingling - multiple tokenization solutions
36
tbd
tbd
37
In cross-domain tokenization, what is "bleed-over"?
Bleed-over happens when a token meant for one domain accidentally works in another domain (merchant A's token works in merchant B). A cross-domain token is capable of operating across multiple environments. However, even a cross-domain token is governed by domain controls.
38
What are the risks associated with "bleed-over" in tokenization?
- Fraudulent use of tokens - Unauthorized charges - PCI scope expansion - Loss of domain isolation These issues often happen if domain binding is misconfigured.
39
In cross-domain tokenization, what happens if the token vault is compromised?
- Attackers can obtain or generate high-value tokens - PAN reconstruction becomes possible - All domains are exposed simultaneously - Catastrophic PCI breach Vault security is critical because all tokenized domains converge there.
40
In cross-domain tokenization, what are 3 examples of over-permissioned API Keys?
If a platform or merchant receives permission to: - migrate tokens - retrieve tokens from another domain - perform cross-domain operations
41
In cross-domain tokenization, if over-permissioning of API keys occur, what are risks that will be exposed?
- Tokens may be misused - Unauthorized payments may occur - Fraud risk may elevate - Increased PCI exposure These risks are especially dangerous in embedded payments or marketplace platforms.
42
In cross-domain tokenization, what happens if token lifecycle management is done poorly?
Since cross-domain tokenization can generate many tokens mapping to the same PAN, if tokens are not managed properly: - stale tokens may accumulate - tokens may continue working when they should not - tokens may be used by retired or unauthorized merchants. This expands the attack surface.
43
Regarding cross-domain tokenization, what happens if an embedded payments platform is breached?
- The attacker may gain access to cross-domain payment methods - Tokens may be reassigned or misused. - All merchants under the platform may be at risk. Cross-domain tokenization multiplies the impact of a single breach.
44
What is token commingling?
Occurs when tokens belonging to different merchants, domains, platforms, or use cases become mixed together in the same environment (intentionally or accidentally).
45
How does token commingling create security risks in payments?
Tokens map back to sensitive payment instruments. This creates, security, fraud, governance, and PCI compliance risks.
46
Why is using a multiple tokenization solution a risky endeavor for fintechs?
Tokens come from multiple providers and may have no business logic around which tokens can be used with different service providers. This creates an opportunity for a merchant to use the wrong token to process a transaction.