| 💼 4.2.1 Strong cryptography and security protocols are implemented to safeguard PAN during transmission over open, public networks. | 2 | | 22 | | no data |
|  💼 4.2.1.1 An inventory of the entity's trusted keys and certificates used to protect PAN during transmission is maintained. | | | | | no data |
|  💼 4.2.1.2 Wireless networks transmitting PAN or connected to the CDE use industry best practices to implement strong cryptography for authentication and transmission. | | | 1 | | no data |
| 💼 4.2.2 PAN is secured with strong cryptography whenever it is sent via end-user messaging technologies. | | | 4 | | no data |