About Us
Services
Blog
Blog
Blog
Industries
Resources
Issues arise for companies, particularly when remote endpoint visibility is limited due to technical factors and remote employees lack the necessary security training and awareness to work securely in a remote setting. Knowing and enforcing your remote employee’s job roles and data access, whether they are onsite or working from home, is critical.
• No Anti-Virus or Signature-based A/V only running on the remote endpoints to detect malware, spyware, and adware
• Endpoint devices not hardened or managed in accordance with the company’s secure configuration standards
• Remote users are not aware of the company’s Acceptable Use policies and guidelines.
• Insufficient Security Awareness training
• No defined roles and responsibilities for the remote employees, restricting system and data-level access to only what is required
• Remote devices not centrally managed or updated with the latest vendor security patches
• Data flow and network diagrams: PCI Requirement 1.1.2
o Network diagrams and data flow diagrams depicting the flow of cardholder data from the remote employee’s home network to the corporate network, along with a narrative to support the flow should be documented.
• Personal firewall on endpoints: PCI Requirement 1.4.
• Hardening Configuration Standards (NIST, CIS, SANs, etc): PCI Requirement 2.1, 2.2, 2.3, 2.4
• Anti-Virus on remote endpoints: PCI Requirement 5.1, 5.2, 5.3, 5.4
• Patch Management: PCI Requirement 6.1, 6.2
o Remote endpoints must be updated with the latest critical security patches.
• Change Management: PCI Requirement 6.4
o Configuration changes made to remote endpoints must be approved and follow the company’s change control process.
• Identify and authenticate access to system components: PCI Requirements 8.1, 8.2, 8.3, 8.4, 8.5, 8.6, 8.7, 8.8
• Ensuring that there are properly enforced policies and procedures with regards to an Acceptable Use Policy: PCI Requirements 12.3 (Usage policy), 12.6 (Security awareness training), 12.7 (background checks)
We look forward to talking to you about your upcoming Security Test, Compliance Assessment, and Managed Security Services priorities. Our expert security consultants and QSAs are fully certified and have decades of experience helping businesses like yours stay safe from cyber threats. Set up a time to chat with us about your biggest payment security and compliance challenges so we can partner with you to solve them!