CyberCX Hack Report: Insights from a year of offensive security testing →

Background

The Payment Card Industry Data Security Standard (PCI DSS) provides a baseline of technical and operational requirements designed to secure payment card data and encourage global adoption of consistent data security measures.

In March 2022 the PCI Security Standards Council published the latest release of the PCI Data Security Standard v4.0. The standard has been reviewed and revised following engagement and feedback with the global payments industry. Over 6000 items of feedback were received during the request for comment periods in the revision period and over 200 companies have provided input into the latest revision.

The revision process focused on the following four key goals:

 Who does PCI DSS apply to?

PCI DSS requirements can be applied to any organisation where account data (cardholder data and/or sensitive authentication data) is stored, processed, or transmitted, and those organisations with environments that can impact the security of the Cardholder Data Environment (CDE).

Cardholder data and sensitive authentication data are considered account data and are defined as follows:

Cardholder Data includes:

Sensitive Authentication Data includes:

 

What are the requirements?

PCI DSS Objective PCI DSS Requirements


Build and Maintain a Secure Network and Systems


Requirement 1:
Install and Maintain Network Security Controls
Requirement 2: Apply Secure Configurations to All System Components

Protect Account Data
Requirement 3: Protect Stored Account Data

Requirement 4:
Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public Networks


Maintain a Vulnerability Management Program

Requirement 5: Protect All Systems and Networks from Malicious Software

Requirement 6:
Develop and Maintain Secure Systems and Software


Implement Strong Access Control Measures

Requirement 7: Restrict Access to System Components and Cardholder Data by Business Need to Know
Requirement 8: Identify Users and Authenticate Access to System Components
Requirement 9: Restrict Physical Access to Cardholder Data

Regularly Monitor and Test Networks
Requirement 10: Log and Monitor All Access to System Components and Cardholder Data

Requirement 11:
Test Security of Systems and Networks Regularly


Maintain an Information Security Policy


Requirement 12:
Support Information Security with Organisational Policies and Programs

 

Why was the standard updated?

The previous release (v3.2.1) was published in May 2018. Since then, complexity regarding securing payment card data has increased due to the adoption of new technologies such as the use of cloud environments. The standard has been updated in response to these changing circumstances and the need to maintain and promote best practice across the payment card industry.

In undertaking the revision, the Council has identified the following change types below:


Why are the latest changes important?

 

What has changed In V4.0?

The good news is that there are no new technical requirements that need to be addressed immediately for v4.0, however there are a few administrative requirements that organisations should already be doing that have been formalised.

In total there are 64 changes. Of these 64, 13 become requirements on the release of v4.0 and specifically relate to:

The remaining 51 changes are required to be implemented by the 31st March 2025.

Summarised below are the key changes based on alignment with the goals stated above:

Goal – Continue to meet the security needs of the payments industry.

Examples of changed requirements:


Goal – Promote security as a continuous process.

Examples of changed requirements:

 

Goal – Increase flexibility for organisations using different methods to achieve security objectives.

Examples of changed requirements:

It is important to stress that the customised approach is not necessarily an easy alternative to addressing the stated criteria in PCI DSS. This approach will require the assessed organisation to work closely together with the Qualified Security Assessor (QSA) to agree upon, and properly document, chosen controls and testing procedures in order to meet the criteria. So, while this adds flexibility there may be incurred additional overhead in threat / risk assessments, documentation, testing etc.

More information on the customised approach is contained in PCI DSS v4.0 in appendix D.

 

Goal – Enhance validation methods and procedures.

Examples of changed requirements:

 

Implementation timeline

PCI DSS v3.2.1 remains active for two years (to 31st March 2024) after the publication of v4.0. This overlap provides organisations who hold PCI DSS certification time to become familiar with the new version, and plan to implement the changes needed.


As stated, with this new release, there are 51 future-dated requirements which will only come into effect after the 31st March 2025 and, until then, will only be considered best practice. As assessor training is not taking place before June 2022, this gives organisations ample time to prepare for and to implement the changes.

More information on implementing the requirements of PCI DSS v4.0 can be found here:

 

How can CyberCX help?

Get in touch to speak to one of our consultants about the adoption of the PCI DSS V4.0 standard or any of our PCI DSS services.

Get in touch

Other Cyber Security Resources

Ready to get started?

Find out how CyberCX can help your organisation manage risk, respond to incidents and build cyber resilience.