We received the following question during the last PCI Dream Team session back in October.
“We have a call center that sometimes takes a credit card numbers from customers. Our senior management keeps pushing us to come up with a work-from-home option for some of our call center employees in case of DR and Business Continuity. We keep telling them that PCI says that all components of such a home setup is subject to PCI standards and thus is impossible, Have any of you seen any solution that would allow this?”
Since that session the Council released the new telephony information supplement that has created a stir in the PCI community. I wrote about the new information supplement a few weeks back so I will not cover that here, but I will rely on it to answer this question.
First and foremost, remote workers are allowed under the PCI DSS as there are no requirements that prohibit it. However, there are PCI-related considerations when you want to implement such an approach.
You will obviously need to develop PCI compliance policies, standards and procedures that will support remote working. If your organization already has policies, standards and procedures for clean desks, secured work area, protection of information, proper handling of sensitive authentication data (SAD) or cardholder data (CHD), then you probably have the bulk of what you need. You will need somewhere in your documentation to allow for your organization to conduct annual and spot inspections of remote working environments for compliance with organization policies, standards and procedures.
If you do not have those policies, standards and procedures, then you will need to get those published, approved and all employees and contractors to formally acknowledge them. Most organizations’ policies, standards and procedures work just fine for corporate environments but do not consider the situation when workers are not in a corporate facility. As a result, it is not unusual to see organizations develop policies, standards and procedures that take into account that the remote workers’ working environment might not necessarily be as secure as those at a corporate controlled office.
The annual inspection can consist of the remote worker taking a picture of their work environment and filling out a form that ensures the remote worker is complying with relevant organizational policies, standards and procedures as related to remote working. I have clients that have remote workers fill out the relevant PCI SAQ depending on their remote worker environment. In all cases, the employee signs the form/AOC stating that they are compliant with all relevant policies, standards and procedures.
It is when the organization has questions, issues or concern with a remote worker is when the spot inspection clause becomes useful. The spot inspection capability allows organization management or an auditor to go to the remote worker’s location and personally examine the work area to ensure that it complies with all policies, standards and procedures.
With the paperwork out of the way, let us now discuss the technical challenges related to remote workers. The goal here is to minimize the PCI scope of the remote worker’s configuration.
The easiest way to do this is using a point-to-point encryption (P2PE) validated solution or an end-to-end encryption (E2EE) solution for the keying of SAD/CHD. Of course, this means that you will have to ensure that your application will work properly with a P2PE/E2EE solution which further means not allowing SAD/CHD to be keyed through anything other than a P2PE/E2EE validated terminal also referred to as the point of interaction (POI). This can also mean pairing the P2PE/E2EE solution with tokenization if your application is expecting CHD back at the end of the transaction.
But P2PE/E2EE only addresses the transaction, not the conversation that results in the transaction. To reduce costs of remote workers, organizations typically implement a softphone. Softphones are great. However, they result in a PCI scoping problem. As a reminder, when a telephone system is used for having conversations involving SAD/CHD, it puts that system and networks in the cardholder data environment (CDE) also known as a Category 1 system. As a result, any other system that connects to the telephone system is now also part of the CDE. Since a soft phone cannot be readily logically or physically segmented from the workstation it connects, it drags the workstation into PCI scope regardless of whether or not SAD/CHD is discussed.
The solution to the softphone issue is to use a physical VoIP phone with a headset. But it is not as simple as just swapping in a physical phone for the softphone. That physical phone needs to be on a logically or physically segmented network that does not include any devices that you desire to be out of PCI scope. It is that segmentation that drives up the cost of the remote worker configuration because you now need to have a managed network device to allow for separate VLANs or physically separate network connections. Not impossible, just costlier than delivering a cable/DSL modem with four Ethernet ports to the remote worker’s location and being done.
As a result of all of this, it is not unusual for organizations that allow for remote workers that need to be PCI compliant to supply those remote workers with a US Department of Defense compliant document shredder, computer or workstation, router, network switch, display(s), keyboard(s), secure POI(s), telephone(s) and any other equipment necessary to ensure compliance with the PCI standards.
In addition to this, there may be other requirements due to the European Union’s General Data Protection Requirement (GDPR), Health Insurance Portability and Accountability Act (HIPAA) or other security or privacy regulations or requirements.