A discussion came up on the last PCI Dream Team session regarding situations at universities that have bookstores and cafeterias operated by third parties on their networks and those vendors processing payment card transactions. QSAs encounter this situation not only at universities and colleges, but also with hospitals, health clinics and large corporations.
The Situation
As organizations focus on customer and employee perks, QSAs encounter third parties operating business outlets within a variety of organizations. These businesses include coffee shops, convenience stores, dry cleaners, bookstores, restaurants, cafeterias, parking ramps, travel agencies, pharmacies, health clubs and a whole host of other businesses. Of course, all of these third parties accept payment cards for their services and need a way to process those cards. Organizations offering these perks have existing wired and wireless infrastructure that get leveraged to connect these third parties to the internet and their payment processors. Thus, bringing that network and everything attached to that network into scope for PCI compliance.
As a result, this situation creates a PCI compliance problem because the organization is now a service provider as well as a merchant. The organization thought by outsourcing these businesses it was reducing PCI scope not increasing scope. But scope increases because since they are now considered a service provider, they must provide each of these third parties with a Service Provider Attestation Of Compliance (AOC) for that network connectivity.
But it can and does get worse. I have encountered situations where the outsourcing organization provides help desk, firewalls and other support services for these third parties, further complicating their PCI compliance responsibilities.
What Do You Do? Option 1 – Get Out Of Scope
There are some ways to get out of scope, but these can be complex and/or expensive.
The first way to get out of scope is to force all of your third parties to get their own network connectivity from their own internet service provider (ISP). The problem with this is that an ISP will likely have to run wire into your facilities to make those connections. That can be disruptive as well as expensive and complicated due to locations within existing buildings. And what if each business wants their own ISP because of a contract relationship? That will mean multiple ISPs tearing up your facilities. Not necessarily the best situation.
The most extreme solution to get out of scope is for the outsourcing organization to implement carrier equipment and become a “carrier” to these third parties. I have had a few clients go down this road, but it is not cheap and can also be more trouble than it is worth. However, for a university or large hospital/clinic complex with lots of third parties, this solution can actually be a cheaper route to implement and operate.
But the beauty of these solutions is that your organization is totally out of scope so there are no service provider PCI assessment requirements.
What Do You Do? Option 2 – Reduce Scope
There are also a couple of ways to reduce scope. But reducing scope requires at a minimum the creation of a Service Provider SAQ D and AOC.
The quickest and easiest way to reduce scope is that the outsourcing organization can implement end-to-end encryption between the third party’s connection and the internet. However, this adds the requirements in section 4 to the assessment as well as keeps the endpoints in scope for PCI compliance.
Another option to reduce scope is to require these third parties to implement encryption from their operation to anyone outside of the outsourcing organization. While this seems simple, it usually never is simple. Never mind the fact that if that encryption is ever stopped (most times without your knowledge), the outsourcing organization’s network is back in scope. Typically, when this gets brought up as a solution, a lot of the third parties balk or say they do not know how to encrypt their connections. Never mind the fact of the complexity of proving that the outsourcing organization does not have encryption keys and that every third party connection is encrypted becomes problematic. It ends up more trouble than it is worth.
The only good news about reduced scope is that you only need to fill out a Service Provider SAQ D and AOC because you have no idea the transaction volumes being processed by any of these third parties. That said though, it is additional paperwork that needs to be filled out annually and given to all your third parties.
Heaven help you though if you offer firewall, help desk and other support services in addition to connectivity. Those just complicate your compliance and reporting efforts. All I can say is, if you can stop offering those services, stop. If you cannot stop those services, then be prepared to document and report on the PCI compliance of each of those services. That can be done in a single assessment, but the AOC must cover each of those services provided individually in a separate section 2g.
Never mind the fact that if some of those services offered give your organization insight into the number of transactions processed by your third parties such as you provide payment processing under one or more of your merchant identifiers, you may end up having to conduct a Service Provider Report On Compliance (ROC) because the transaction volume exceeds one of the card brands’ annual service provider transaction volumes.
There you have it on third parties and their payments on your network.