I got a comment a while back about contracts and PCI compliance. The two requirements that are relevant in this discuss are 12.8.2 and 12.9. Requirement 12.8.2 is for all organizations (merchants and service providers) that are being assessed under the PCI DSS. Requirement 12.9 is only for service providers.
As usual, the clarifications surrounding these requirements were all provided verbally over the years at various PCI Community Meeting presentations and Q&A sessions. But the overall gist of these requirements can be readily determined. It just takes a little bit of effort and looking at more than just the PCI DSS.
Requirement 12.8.2 states:
“Maintain a written agreement that includes an acknowledgement that the service providers are responsible for the security of cardholder data the service providers possess or otherwise store, process or transmit on behalf of the customer, or to the extent that they could impact the security of the customer’s cardholder data environment.
Note: The exact wording of an acknowledgement will depend on the agreement between the two parties, the details of the service being provided, and the responsibilities assigned to each party. The acknowledgement does not have to include the exact wording provided in this requirement.”
The Guidance provided for 12.8.2 states:
“The acknowledgement of the service providers evidences their commitment to maintaining proper security of cardholder data that it obtains from its clients. The extent to which the service provider is responsible for the security of cardholder data will depend on the particular service and the agreement between the provider and assessed entity.
In conjunction with Requirement 12.9, this requirement is intended to promote a consistent level of understanding between parties about their applicable PCI DSS responsibilities. For example, the agreement may include the applicable PCI DSS requirements to be maintained as part of the provided service.”
If things are still not clear enough, it helps to look at the ROC Reporting Template to get clarification. The tests being conducted for a given requirement usually clear up any confusion regarding what is being expected. There is only one test for 12.8.2 and it states:
“Describe how written agreements for each service provider were observed to include an acknowledgement by service providers that they will maintain all applicable PCI DSS requirements to the extent the service provider handles, has access to, or otherwise stores, processes, or transmits the customer’s cardholder data or sensitive authentication data, or manages the customer’s cardholder data environment on behalf of a customer.”
The first thing to notice in all of these discussions is that nothing in the PCI DSS states that any organization is required to work with a PCI compliant third party. None of the requirements in 12.8 specify that an Attestation Of Compliance (AOC) be provided. A lot of QSAs will argue that requirement 12.8.4 requires it, but if you read the test:
“Describe how it was observed that the entity maintains a program to monitor its service providers’ PCI DSS compliance status at least annually.”
There is nothing in that test that explicitly mandates that an AOC is required to monitor third parties. Granted an AOC is the easiest way to monitor service provider compliance, but there is nothing explicitly calling it out in this test.
So where does this “requirement” originate? It comes from the merchant agreements with the card brands, specifically Visa and MasterCard. They require that their merchants only work with third parties that are PCI compliant and can prove that compliance with a Service Provider AOC. This is why it is important to read and understand the brands’ merchant agreements and their own security programs. There are a number of key “requirements” that come from those documents that are just as important as what is in the PCI DSS. So, read them as well as all of the PCI documents.
Getting back to the PCI DSS, what the Council wants QSAs and ISAs to look for in contracts, master service agreements, addendums and any other legal documents that describe the parties’ legal relationship is some sort of acknowledgement between all parties that they will abide by the PCI DSS and ensure that sensitive authentication data (SAD) and cardholder data (CHD) is kept secure.
Where a lot of QSAs/ISAs go wrong is demanding that the words “PCI DSS”, “PCI standards” or other explicit acknowledgement of “PCI” something to appear somewhere in those documents. The Council has stated a number of times that explicitly using “PCI DSS”, “PCI standards” or “PCI” anything is not required. It would be great if such documents did, but a lot of legal documents do not because they either predate the PCI DSS or lawyers argue it is not necessary. That is what led to the Note in both requirements. The key is the last sentence which explicitly states:
“The acknowledgement does not have to include the exact wording provided in this requirement.”
It is this sentence that the Council always points to and states that this is why explicit statements of PCI or any other direct reference to PCI is not necessary nor required. My advice is, when in doubt, ask your client’s legal counsel for their legal interpretation of the legal agreements and whether they fell it covers the PCI responsibilities of the parties involved.
That will lead you to the fact that a lot of legal agreements reference the PCI DSS and PCI standards indirectly through language that obligates the parties to follow and comply with “regulatory or other legal requirements”. The reason this language works is because “other legal requirements” will drag in the card brand legal agreements for taking and processing card payments. Every card brand has legal agreements for merchants and service providers that explicitly call out that the customer of the brand will maintain PCI compliance for all relevant PCI standards.
Where this discussion becomes problematic is with service providers that do not directly process, store or transmit SAD/CHD such as managed service providers and the like that can affect the security of payments. That is because they are not directly under the card brands’ legal agreements, so their contracts while using the same “regulatory or other legal requirements” will not necessarily be referencing PCI compliance because they are indirectly involved. It is in these cases that I rely on getting a PCI AOC from the service provider which then provides the additional assurance that the service provider understands that they need to be PCI compliant.
It is when I cannot obtain an AOC from a service provider that I then explain to my client that this service provider’s environment needs to be assessed as part of their assessment. Either that or my client needs to find a new PCI compliant service provider.
What a QSA/ISA needs to be looking for in a service provider’s AOC is a couple of things (actually, there are a lot of things, but these are the most important).
First, you need to ensure that the services provided to your client have all been covered by the service provider’s assessment. Section 2a of the AOC documents the services covered and not covered. The most common problem found with section 2a is that one or more services used by an organization were not assessed. If services were not assessed, then you need to notify the service provider and develop a plan of how to handle this situation.
The next thing to review is the locations that were part of the assessment. It still amazes me the number of AOCs I review where a client’s data center or processing center was not part of the assessment. It gets worse when you bring this to the attention of the service provider and they get put out or worse, they argue with you over the fact that they must review every facility where a service is conducted. I am sorry, the PCI SCC and the card brands are the ones that make the rules, I am just the poor assessor that must enforce and live by them.
Finally, you need to review section 2g for all of the services assessed (if they were assessed from section 2a). Section 2g are a matrix of the 12 PCI DSS sections that explains who is responsible for the various PCI DSS requirements. From this matrix an organization is to construct their PCI program to fit the controls that they need to implement to be PCI compliant for this service.
There should be a section 2g for every individual service assessed, but in instances where PCI coverage is the same for different services (e.g., SaaS application hosting), you can combine services in section 2g. However, this is where problems usually are found. My favorite example of such a problem is the day I found data center co-location and call center services listed in the same matrix. I am sorry, but those services have very little similarity particularly in PCI controls. When you encounter this situation, it is usually indicative of a QSAC that does not understand how to deal with service providers and is cutting corners to get the ROC and AOC out the door. In addition, it also likely indicates a service provider that is just “checking a box” for PCI compliance to placate customers. But worse is when that service provider is listed on the Visa or MasterCard service provider lists (it is rare, but I have seen it) which then indicates that the brands are also not doing their due diligence in their review of the AOC.
Hopefully, you now better understand requirement 12.8.2. In a future post I will discuss requirement 12.9.