Identify all instances where PAN is stored (including system components, portable digital media, backup media, and in logs).
For each instance of stored PAN:
i. Identify the documents describing the methods for protecting the PAN.
ii. Briefly describe the implemented methods—including the vendor, type of system/process, and the encryption algorithms (if applicable)—used to protect the PAN.
iii. Describe how the implemented methods render the PAN unreadable using any of the following defined methods:
o One-way hashes based on strong cryptography
o Truncation
o Index tokens and pads, with the pads being securely stored
o Strong cryptography, with associated key-management processes and procedures