Restrict Access to Cleartext Keys
To meet the “restrict access to cleartext keys” requirement, you must ensure only the minimum necessary, explicitly designated key custodians can ever view or handle cryptographic keys (or key components) in cleartext, and that all other roles use systems where keys remain protected (for example inside an HSM or managed KMS). Your job is to reduce who can access cleartext key material, prove it, and keep it that way.
Key takeaways:
- Treat cleartext key access as a high-risk, break-glass capability, not a normal admin permission.
- Define a short list of key custodians, document why each is necessary, and enforce access controls and logging to match.
- Keep durable evidence: custodian roster, approvals, access reviews, and technical proof that most staff cannot extract or view keys.
“Cleartext keys” are the kryptonite of a cardholder data environment. If an attacker, insider, or compromised admin account can obtain encryption keys in readable form, encryption becomes irrelevant and stored cardholder data becomes recoverable. PCI DSS addresses this directly by requiring strict restriction of access to cleartext cryptographic key components.
This requirement is narrower than “limit admin access.” It focuses on one specific capability: viewing or handling key material (or portions of it) in cleartext. In practice, teams fail this control in predictable ways: too many cloud admins can export KMS key material, too many engineers can read secrets from CI/CD logs, or too many people can retrieve private keys from a shared password vault. Auditors then ask the obvious question: “Show me exactly who can access cleartext key components today, and why they need it.”
This page translates PCI DSS 4.0.1 Requirement 3.6.1.3 into an operator-ready checklist: scope it, define custodian roles, implement the technical restrictions, and retain the evidence that makes the control auditable.
Regulatory text
PCI DSS requirement (verbatim): “Access to cleartext cryptographic key components is restricted to the fewest number of custodians necessary.” (PCI DSS v4.0.1 Requirement 3.6.1.3)
What an operator must do:
- Identify where cleartext key material (or key components) could be accessed across your environment.
- Assign a minimal set of approved key custodians who are allowed to access cleartext key components for defined key management tasks.
- Enforce the restriction with technical controls (IAM, HSM/KMS configuration, vault permissions, break-glass), then prove the restriction with logs, reviews, and documented procedures.
Plain-English interpretation (what “restrict access to cleartext keys” means)
- Cleartext key material is any cryptographic key (or key component) that a human or process can read in unencrypted form. Examples include a private key file, a symmetric encryption key value, or split-key components printed or stored separately.
- Key components refers to pieces of a key under a split-knowledge scheme or similar process where multiple custodians each hold a portion.
- Fewest number of custodians necessary means you must intentionally minimize and justify the list of people who can access cleartext key components, based on actual operational need. “All infrastructure admins” is not a justification.
A practical test: if a staff member can copy/paste a key value, download a private key, print a key component, or read key material from a secrets store, they likely have cleartext access and must either be a custodian or be technically blocked from doing so.
Who it applies to (entity and operational context)
Entity types: Merchants, service providers, and payment processors handling cardholder data or sensitive authentication data where cryptographic keys protect that data (PCI DSS v4.0.1 Requirement 3.6.1.3).
Operational contexts where this requirement shows up during audits:
- Key generation and rotation for PAN encryption, tokenization systems, database TDE keys, and application-layer encryption.
- HSM/KMS administration (cloud KMS, on-prem HSMs, key managers).
- Secrets management (vaults holding private keys, API signing keys, mTLS keys, or key-encrypting keys).
- Backup/DR workflows where keys are escrowed or exported “temporarily.”
- Third parties that manage encryption or key operations on your behalf (managed HSM, managed database, SaaS tokenization). You still need to ensure contractual and technical boundaries prevent your broader user base from gaining cleartext access.
What you actually need to do (step-by-step)
Step 1: Inventory “cleartext key exposure paths”
Build a short, auditable map of every way keys could be accessed in readable form:
- Cloud KMS/HSM: can any role export key material or decrypt key blobs outside protected hardware?
- Secrets manager: who can read secret values that are keys?
- CI/CD: do build logs, artifacts, or environment variables expose keys?
- Source control: are keys ever committed, even briefly?
- Endpoints: are private keys stored on engineer laptops or shared jump boxes?
- Break-glass accounts: do they allow secret reads or key exports?
Deliverable: a “Cleartext Key Access Inventory” covering systems, key types, and access methods.
Step 2: Define and approve “key custodian” roles (minimal roster)
Create a named list of key custodians and tie each person to:
- The key systems they administer (HSM/KMS/vault)
- The specific tasks requiring cleartext component access (if any)
- The approval authority for their access
- A removal trigger (role change, termination, project end)
Keep the roster tight. If you cannot explain why a person needs cleartext access, remove it and force the workflow through protected cryptographic services.
Deliverable: “Key Custodian Register” with business justification per custodian.
Step 3: Engineer the environment so most people never see key material
This is where controls become real:
A. Prefer non-exportable keys and hardware-backed protection
- Configure keys as non-exportable wherever possible.
- Use HSM-backed or managed KMS keys so applications call cryptographic operations (encrypt/decrypt/sign) without exposing key values to operators.
B. Separate duties: crypto operators vs platform operators
- Platform admins can manage infrastructure, but cannot read/export key material.
- Key custodians can manage keys, but cannot deploy application code unreviewed (where feasible). This reduces “one person can do everything.”
C. Implement least privilege in IAM
- Remove permissions that allow secret reads or key exports from broad roles.
- Create narrow roles for key management operations. Require ticket-based approval to assign those roles.
D. Use break-glass for rare cleartext operations If a process truly needs cleartext key component handling (for example, split knowledge ceremonies):
- Put access behind a break-glass workflow: time-bound access, explicit approvals, strong MFA, and full logging.
- Require dual control for the most sensitive actions (two-person approval or presence).
E. Lock down storage paths
- Prohibit storing keys in collaboration tools, shared drives, and general password managers unless the tool supports strict access control, auditing, and appropriate cryptographic protections.
- Ensure backups of secrets stores are encrypted and access-controlled so backups do not become a side door to cleartext keys.
Deliverable: IAM role definitions and system configurations that demonstrate “most roles cannot read key material.”
Step 4: Log, monitor, and review access to cleartext key components
Auditors will ask, “How do you know this is still restricted?”
- Enable audit logs on KMS/HSM/vault and centralize them.
- Alert on sensitive events such as secret reads for key objects, key export attempts, policy changes, and break-glass activation.
- Perform periodic access reviews for the custodian group and any roles that can read key secrets. Document removals.
Deliverable: logging configuration proof, alert rules, and completed access reviews.
Step 5: Extend the control to third parties
For any third party operating your encryption platform or holding keys:
- Contractually require least-privilege access to key material and define custody responsibilities.
- Obtain evidence they restrict access (their custodian roster or SOC report sections relevant to logical access and key management, if available).
- Ensure your own staff cannot bypass controls through the third party’s admin consoles.
Deliverable: third-party due diligence packet focused on key custody and access restriction.
Required evidence and artifacts to retain
Keep evidence in an audit-ready folder mapped to this requirement:
- Key Custodian Register (named individuals, role, justification, approval date, manager/system owner sign-off).
- Cleartext Key Access Inventory (systems, keys, access paths, owner, control points).
- IAM policy exports / screenshots showing who can:
- Read key secrets from vault
- Export or decrypt key material
- Administer KMS/HSM policies
- Break-glass procedure and runbooks for any cleartext key component handling.
- Audit logs (or log samples) demonstrating monitoring of key access events.
- Access review records showing periodic recertification and removals.
- Key management procedures that describe how keys are generated, stored, rotated, and retired, with custody controls embedded.
Tip: If you use Daydream to run control testing, store the custodian roster, access review outcomes, and evidence links as a single control record so you can answer auditor requests without re-collecting screenshots every cycle.
Common exam/audit questions and hangups
Auditors tend to focus on a few pressure points:
- “Show me every role that can retrieve encryption keys in cleartext.”
- “Who are your key custodians, and why does each need access?”
- “Can a cloud admin export KMS key material or read secrets that contain keys?”
- “How do you prevent engineers from copying keys from CI/CD variables or build logs?”
- “What happens during incident response if you need to rotate keys quickly? Who gets access, and how is it logged?”
- “How do you control key access at your third party providers?”
Hangup: Teams claim keys are “in KMS” but still allow broad permissions to decrypt key blobs or read secret values. The auditor will treat that as cleartext exposure if a human can retrieve usable key material.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: Treating “KMS admin” as harmless.
Fix: Split permissions. Many environments can separate “policy admin” from “key material access” actions. Keep the latter extremely limited. -
Mistake: Keys stored as generic secrets with broad read access.
Fix: Put keys in a dedicated path/namespace, limit read permissions to a tight service identity set, and block human reads except custodians. -
Mistake: CI/CD spills secrets into logs.
Fix: Mask sensitive variables, block echo/print patterns in pipelines, and restrict who can view pipeline logs and artifacts. -
Mistake: No evidence that restrictions are maintained.
Fix: Schedule access reviews and retain outputs. Keep log samples that show key access events are captured. -
Mistake: Third party key handling is assumed, not verified.
Fix: Add explicit custody and access restriction requirements in contracts and due diligence. Ask for concrete artifacts.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this specific requirement, so you should treat audit and assessor scrutiny as the primary external driver. Operationally, the risk is straightforward: any path that exposes cleartext key material becomes a single point of failure for encrypted cardholder data protections. That elevates both breach impact and incident complexity, because you may need to assume data exposure if keys are compromised.
Practical execution plan (30/60/90)
Use phases rather than day-count promises; the effort depends on how many systems and teams touch keys.
First 30 days (stabilize and stop the bleeding)
- Identify all systems that store or process cryptographic keys related to cardholder data.
- Pull IAM role memberships for KMS/HSM/vault and list who can read/export key material.
- Remove obvious over-permissioned users and roles; implement break-glass where access cannot be removed immediately.
- Create the initial Key Custodian Register and get system-owner approval.
Days 31–60 (engineer durable restrictions)
- Convert keys to non-exportable or hardware-backed configurations where feasible.
- Refactor secrets storage so key secrets are in dedicated namespaces with narrow read permissions.
- Implement dual control or approval workflow for custodian role assignment.
- Turn on and centralize audit logs for key access events.
Days 61–90 (make it auditable and repeatable)
- Run the first formal access recertification for custodians and key-reading roles.
- Add alerting and incident runbooks for suspicious key access patterns.
- Close third-party gaps: contract language, evidence requests, and documented responsibility matrix.
- Package evidence for your assessor: inventories, rosters, IAM exports, logs, and review records.
Frequently Asked Questions
What counts as “cleartext cryptographic key components” in practice?
Anything that allows a person or process to obtain usable key material in readable form, including split-key components held by different custodians. If someone can copy the value, download a key file, or read it in a secrets manager, treat it as cleartext access under this requirement (PCI DSS v4.0.1 Requirement 3.6.1.3).
If our keys are in cloud KMS, are we automatically compliant?
No. You still must prove that only the minimum necessary custodians can access key material in cleartext, and that broad admin roles cannot export or retrieve key values. Many KMS deployments fail due to overly broad IAM permissions rather than weak cryptography (PCI DSS v4.0.1 Requirement 3.6.1.3).
Do application engineers count as “custodians” if their service can decrypt data?
Usually no, if the service performs cryptographic operations without exposing key material to humans. Engineers become custodians if they can directly read or extract key material, for example by reading vault secrets or exporting key files (PCI DSS v4.0.1 Requirement 3.6.1.3).
How do we handle emergency access for key recovery or incident response?
Use a break-glass workflow with explicit approval, strong authentication, time-bound access, and full logging. Document the procedure and keep records of each activation so you can prove the access stayed exceptional and controlled (PCI DSS v4.0.1 Requirement 3.6.1.3).
What evidence does an assessor usually accept to prove we restricted access?
A custodian roster with approvals, IAM role and policy exports showing who can read/export keys, and logs demonstrating monitoring of key access events. The best evidence shows both “design” (policies, roles) and “operation” (reviews, logs) (PCI DSS v4.0.1 Requirement 3.6.1.3).
How should we address third parties that manage encryption or hold keys for us?
Define key custody and access restrictions contractually, then collect proof through due diligence (for example, access control descriptions and audit evidence they can provide). Also ensure your own staff cannot access cleartext keys through the third party’s admin interfaces beyond the approved custodian set (PCI DSS v4.0.1 Requirement 3.6.1.3).
Frequently Asked Questions
What counts as “cleartext cryptographic key components” in practice?
Anything that allows a person or process to obtain usable key material in readable form, including split-key components held by different custodians. If someone can copy the value, download a key file, or read it in a secrets manager, treat it as cleartext access under this requirement (PCI DSS v4.0.1 Requirement 3.6.1.3).
If our keys are in cloud KMS, are we automatically compliant?
No. You still must prove that only the minimum necessary custodians can access key material in cleartext, and that broad admin roles cannot export or retrieve key values. Many KMS deployments fail due to overly broad IAM permissions rather than weak cryptography (PCI DSS v4.0.1 Requirement 3.6.1.3).
Do application engineers count as “custodians” if their service can decrypt data?
Usually no, if the service performs cryptographic operations without exposing key material to humans. Engineers become custodians if they can directly read or extract key material, for example by reading vault secrets or exporting key files (PCI DSS v4.0.1 Requirement 3.6.1.3).
How do we handle emergency access for key recovery or incident response?
Use a break-glass workflow with explicit approval, strong authentication, time-bound access, and full logging. Document the procedure and keep records of each activation so you can prove the access stayed exceptional and controlled (PCI DSS v4.0.1 Requirement 3.6.1.3).
What evidence does an assessor usually accept to prove we restricted access?
A custodian roster with approvals, IAM role and policy exports showing who can read/export keys, and logs demonstrating monitoring of key access events. The best evidence shows both “design” (policies, roles) and “operation” (reviews, logs) (PCI DSS v4.0.1 Requirement 3.6.1.3).
How should we address third parties that manage encryption or hold keys for us?
Define key custody and access restrictions contractually, then collect proof through due diligence (for example, access control descriptions and audit evidence they can provide). Also ensure your own staff cannot access cleartext keys through the third party’s admin interfaces beyond the approved custodian set (PCI DSS v4.0.1 Requirement 3.6.1.3).
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream