What is “PCI scope?”
PCI Scope is nothing but part of your environment that must meet the 12 requirements stated within the PCI Data Security Standard (DSS). The scope is a combination of people, processes, and technologies that interact with or could otherwise impact the security of cardholder data (CHD).Internal systems and networks
Whatever assets store, process, or transmit payment card data are “in scope” for PCI Compliance. any system component that stores or processes or transmits payment card information are considered as a part of CDE. The PCI DSS security requirements apply to all entities involved in the payment car process including merchants, processors, issuers, and service providers. It applied to all system components included in or connected to the cardholder data environment. The cardholder data environment (CDE) is comprised of people, processes and technologies that store, process, or transmit cardholder data or sensitive authentication data.Service Providers and other Third Parties
All business partners, entities providing remote support services, and other service providers connected to cardholder data environment (CDE) or may have risk of potentially compromise an entity’s CDE are also considered in PCI DSS scope. If an entity outsources in-scope functions or facilities to a third party, or utilizes a third-party service that impacts how it meets PCI DSS requirements, the entity will need to work with the third party to ensure the applicable aspects of the service are included in scope for PCI DSS.How to do PCI Scoping exercise?
In December, 2016, the PCI Security Standards Council (SSC) released a supplemental guide for scoping and network segmentation. Accurate scoping involves critically evaluating the CDE and connected-to system components to determine the necessary coverage for PCI DSS requirements. It has provided following important activities as a first step of a PCI DSS assessment is to accurately determine the scope of the review.| Activity | Description |
| Identify how and where the organization receives cardholder data (CHD) | 1. Identify all payment channels and methods for accepting CHD, from the point where the CHD is received through to the point of destruction, disposal or transfer. |
| Locate and document where account data is stored, processed, and transmitted | 2. Document all CHD flows, and identify the people, processes, and technologies involved in storing, processing, and/or transmitting of CHD. These people, processes, and technologies are all part of the CDE. |
| Identify all other system components, processes, and personnel that are in scope. | 3. Identify all processes (both business and technical), system components, and personnel with the ability to interact with or influence the CDE (as identified in 2, above). These people, processes, and technologies are all in scope, as they have connectivity to the CDE or could otherwise impact the security of CHD. |
| Implement controls to minimize scope to necessary components, processes, and personnel. | 4. Implement controls to limit connectivity between CDE and other in-scope systems to only that which is necessary. 5.Implement controls to segment the CDE from people, processes, and technologies that do not need to interact with or influence the CDE. |
| Implement all applicable PCI DSS requirements. | 5. Identify and implement PCI DSS requirements as applicable to the in-scope system components, processes, and personnel. |
| Maintain and monitor. | 6. Implement processes to ensure PCI DSS controls remain effective day after day. 8.Ensure the people, processes, and technologies included in scope are accurately identified when changes are made |
- CDE Systems
- These are in scope for PCI DSS.
- These must be evaluated against all PCI DSS requirements to determine the applicability of each requirement.
- Connected-to and/or Security-Impacting Systems
- Are in scope for PCI DSS. Even where a connection is limited to specific ports or services on specific systems, those systems are included in scope to verify that the applicable security controls are in place.
- Must be evaluated against all PCI DSS requirements to determine the applicability of each requirement.
- Must not provide an access path between CDE systems and out-of-scope systems.
- Out-of-scope Systems
- Are not in scope for PCI DSS; therefore, PCI DSS controls are not required.
- Have no access to any CDE system; if there is any access, then system is in scope.
- Are considered untrusted (or “public”)—there is no assurance they have been properly secured.
- If on the same network(or subnet or VLAN)as, or otherwise has connectivity to, a connected-to or security impacting system, controls must be in place to prevent the out-of-scope system from gaining access to the CDE via the in-scope systems. These controls must be validated at least annually.
- Note: These systems are not in scope for PCI DSS but could still represent a risk to the CDE if not secured. It is strongly recommended that security best practices be implemented for all out-of-scope systems/networks.
How can I reduce PCI DSS scope?
- If you do not need it, do not store it!
- Network segmentation
- The scope of the PCI DSS assessment
- The cost of the PCI DSS assessment
- The cost and difficulty of implementing and maintaining PCI DSS controls
- The risk to an organization (reduced by consolidating cardholder data into fewer, more controlled locations)
- Tokenization
- Using a PCI-listed P2PE Solution
- Outsourcing to a third-party service provider
