This was a question we got from our last PCI Dream Team session on the Cloud.
“Issue – found CVV in historical call recordings that need to be purge/delete. We are not able to purge the entire call record and still need to keep it for record retention. What tools should be evaluated to help address this issue?”
A lot of organizations are discovering that how they did things in the past did not meet PCI, GDPR or other legal or regulatory requirements when data in their possession needs to be protected. Gone are those freewheeling days of collecting data without worrying about how to secure and protect it. Customers and the public at large are realizing the value of their information and the need to protect it. All of which starts organizations thinking about how to reduce the risk they have because they have all of this data and they are being held responsible for having it. The patchwork of state laws in the US hold a lot of organizations at risk, some higher than others.
There are also the sins that come to light down the road. It is not unusual to have a PCI in scope application crawl out of the woodwork years down the road at large organizations. It should have been identified way back when the organization was starting out in PCI, but somehow was missed and just now turned up. Unfortunately, these discoveries tend to turn up at the 11th hour of the organization’s current PCI assessment and there is no way to include the application without causing a delay in issuing the ROC.
Surprise!
So, let us talk about the last case first. The application that we uncover very late in the PCI assessment.
What should happen and in the example cited did happen, was a conversation with the acquiring bank. The situation was explained as well as the risk involved (it was storing encrypted PAN) and the bank was asked do we delay filing the ROC and assess this application (likely a delay of longer than 90 days) or do we keep moving ahead as planned and pick up the newly disclosed application in the next assessment?
The bank decided that they did not want to delay the ROC filing since it was just out of our QA process, had been sent to the client for their review and was due in around 30 days.
The client looked further into the application and determined that it could be easily remediated with tokenization from their gateway. As a result, when time came for the next year’s assessment, the application had been remediated with tokenization. We took a look at it and confirmed it no longer contained encrypted PAN and explained to the bank that it would no longer be in scope.
However, things do not always end that well. I have also had occasions where no remediation was possible for a variety of reasons and had to go in the following year and assess the new discovered application in all its PCI compliance (and in some cases non-compliance) glory.
Remediate
Getting back to our original sin, so to speak.
First and foremost, you may not be able to remediate your files due to legal or regulatory constraints. So, before you go charging ahead on your remediation efforts, make sure you discuss it with your legal and compliance folks to ensure you are not creating an even bigger problem. Assuming you are allowed to remediate data, you can proceed with reading the rest of this section.
Structured data is typically easy to remediate. You find out what XML tags to look for, fields or what database columns are involved, you develop a program to remediate the data to first six and/or last four for the PAN or erasing data for any information you were not supposed to keep and execute. Easy. Well, easy until you take into account backups which can complicate remediation if you cannot just erase the backups.
Unstructured data as with call recordings and notes/comments fields can be a nightmare to remediate. The reason of course is that the data has no structure and does not necessarily occur in the same place. Unlike XML or a database where data is at least tagged or in a column, unstructured data exists wherever it exists and programs to remediate the sensitive data need to find it and then eradicate it. That introduces the problem of false positive results. I wrote all about the “fun” of trying to find cardholder data (CHD) five years ago and it has not necessarily gotten any better. The bottom line with unstructured data is that it may not be possible to completely remediate the problem.
However, the best you may be able to do is to remediate the data when it is encountered. Going back to call recordings, if the quality assurance review process or any process that has someone review recordings encounters CHD they redact the information from the file so that it is no longer in that file. Not perfect, but slowly you reduce the amount you are storing. You still have to encrypt the files for protection, but you are making an effort to reduce risk by reducing the amount of viable data.
Isolate It
This most commonly occurs with call recordings, but I have encountered the occasional “legacy” application that it applied to as well.
In the either case, the old system is being decommissioned and a new solution (usually outsourced) is being implemented. The question comes up, “what do we do with the old system?” The reason is that for customer service, legal and/or regulatory reasons it cannot just be wiped and destroyed. It needs to be retained for some period of time before that can happen.
The answer is to keep the system powered up, but off any other network. If people need access, they need to go to a PC or workstation that is connected to a private, air gapped, isolated network that consists of the old system and the PCs or workstations to be used to access the old system. No internet or other network access is provided, only a network that contains those few isolated systems. This will allow the system and workstations to age yet remain protected because of the air gap. Remember, the PCs and workstations will also age along because it is highly likely that new software may not allow connectivity to the old system. This is why everything will need to be air gapped.
I usually get asked for the reason to keep the old solution powered up. That comes from a study done long ago by IBM. What the IBM study found was that systems that get powered off after years of operation have a tendency to fail after being powered off for any extended length of time (i.e., long enough to cool down). As a result, if you intend to keep the system around and available, you best keep it powered up albeit isolated as discussed earlier.
One of the larger issues with isolation will be monitoring of the air gapped network to ensure it remains air gapped and how you respond if that air gapped is breached. There are a number of ways to address this issue, so pick the solution that best fits your environment.
Isolation is not a perfect solution. It will likely require a number of compensating control worksheets (CCW) to address the fact that you have a number of “antique” systems around. So be prepared for that work effort as it will likely not be small.