No PCI rules still allow you to store the CC number. Not the CVV. Ideally using tokenization would be best. But Everest does not allow use to use any tokenization service. So you are handcuffed.
Page 14
from PCI handbook:
Protect Cardholder Data
Cardholder data refers to any information printed, processed, transmitted or stored in any form on a
payment card. Organizations accepting payment cards are expected to protect cardholder data and
to prevent their unauthorized use – whether the data is printed or stored locally, or transmitted over a
public network to a remote server or service provider.
Requirement 3: Protect stored cardholder data
In general, no cardholder data should ever be stored unless it’s necessary to meet the needs of the
business. Sensitive data on the magnetic stripe or chip must never be stored. If your organization
stores PAN, it is crucial to render it unreadable (see 3.4, and table below for guidelines).
3.1 Limit cardholder data storage and retention time to that required for business, legal, and/or
regulatory purposes, as documented in your data retention policy.
3.2 Do not store sensitive authentication data after authorization (even if it is encrypted). See
guidelines in table below.
3.3 Mask PAN when displayed; the first six and last four digits are the maximum number of digits
you may display. Not applicable for authorized people with a legitimate business need to see
the full PAN. Does not supersede stricter requirements in place for displays of cardholder data
such as on a point-of-sale receipt.
3.4 Render PAN, at minimum, unreadable anywhere it is stored – including on portable digital
media, backup media, in logs, and data received from or stored by wireless networks.
Technology solutions for this requirement may include strong one-way hash functions,
truncation, index tokens, securely stored pads, or strong cryptography. (See PCI DSS Glossary for
definition of strong cryptography.)
eNCRyPTIoN PRIMeR
Cryptography uses a mathematical
formula to render plaintext data
unreadable to people without
special knowledge (called a “key”).
Cryptography is applied to stored
data as well as data transmitted
over a network.
Encryption changes plaintext into
ciphertext.
Decryption changes ciphertext
back into plaintext.
Illustration: Wikimedia CommonsThis Guide provides supplemental information that does not replace or supersede PCI DSS version 1.2 documents. 15
3.5 Protect cryptographic keys used for encryption of cardholder data from disclosure and misuse.
3.6 Fully document and implement all appropriate key management processes and procedures for
cryptographic keys used for encryption of cardholder data.
Guidelines for Cardholder Data elements
Data Element Storage
Permitted
Protection
Required
PCI DSS
Req. 3.4
Cardholder Data
Primary Account Number (PAN) Yes Yes Yes
Cardholder Name1 Yes Yes1 No
Service Code1 Yes Yes1 No
Expiration Date1 Yes Yes1 No
Sensitive
Authentication
Data2
Full Magnetic Stripe Data3 No N/A N/A
CAV2 / CVC2 / CVV2 / CID No N/A N/A
PIN / PIN Block No N/A N/A
1 These data elements must be protected if stored in conjunction with the PAN. This protection should be per PCI DSS
requirements for general protection of the cardholder data environment. Additionally, other legislation (for exam