A few months ago, we published a blog “There’s Trouble Brewing: In Place with Remediation”. In this blog post, we provide an update on the latest around In Place with Remediation status that includes comments from the PCI Council as well as some strategic advice to help reduce the probability that you find yourself in this situation.
The PCI DSS v4.x ROC Template – Frequently Asked Questions document on the Council’s site provides the following as the purpose of this new assessment finding:
“In all cases where In Place with Remediation is used, the assessor must have:
The FAQ also provides examples of when this response status can be used:
The Council goes on to state that assessors should compare responses year over year to identify the same problematic findings.
- Have you considered the contractual terms you have with your customers for maintaining PCI compliance (would you be in breach of contract if you had a requirement with a status of “In Place with Remediation")?
- Do you have notification clauses in contracts with your customers if you become out of compliance with PCI during the term of the contract?
- Do you have any customers who would see this as an opportunity to cancel a contract or to litigate?
What are some proactive things you can do to reduce the probability of this finding? Here are three things you can do to hopefully avoid In Place with Remediation status:
1. Perform a gap assessment prior to doing the actual PCI assessment. This will help identify areas you need to remediate prior to beginning the assessment. Note that you can do a partial gap assessment to assess those areas where you know your organization has struggled in the past.
2. If applicable, review past remediation items you were required to perform during your previous assessments. Take note of any areas where you believe you may still have issues. Revisit and resolve these issues prior to your QSA beginning the assessment.
3. Strive to increase security maturity towards continuous compliance and not just during the assessment window. Assign a Program Manager to monitor the status of any maintenance items that are required to be completed throughout the year. This includes some of the following, just to name a few of those we regularly see where remediation is required:
a. Firewall rule set reviews
b. External vulnerability scans – with clean scans
c. Internal vulnerability scans – with clean scans
d. Inventory of all system components in scope of the assessment
e. Penetration tests – with clean test
f. Scope documentation (as further defined in v4.0)
As a newly certified v4.0 Assessor who has spent hundreds of hours studying v4.0 and watching the PCI SSC’s v4.0 Global Symposium, I would say that better preparation will be imperative to v4.0. I wouldn’t even consider having my QSA begin the assessment until I had the following ready and on the table for them:
Being prepared will be key to navigating this new Standard as it will be the epitome of the seven Ps (prior proper planning prevents piss poor performance).
Let me know if we can help!