March 2024
is when PCI DSS v3.2.1 was retired and v4.0 became the only accepted standard for all assessments
12 requirements
are the core of PCI DSS v4.0 -- scoping which systems they apply to is the first and most important step in any compliance program
Requirement 11.3.1
now mandates vulnerability scans every 3 months AND after any significant change -- a common gap in organizations migrating from v3.2.1
SAQ A
covers merchants that fully outsource all payment processing (e.g., Stripe Checkout, Braintree iFrame) -- only 14 requirements apply

PCI DSS v4.0 applies to every organization that stores, processes, or transmits payment card data. The 12 core requirements cover 300+ individual controls, but the place to start is scope reduction: the smaller your cardholder data environment (CDE), the fewer controls apply. A 90-day roadmap for teams starting fresh focuses on three phases: define scope, close critical gaps, and prepare for assessment.

Week 1-2: Scoping the Cardholder Data Environment

What goes in scope: any system that stores, processes, or transmits PAN, SAD (full magnetic stripe, CVV, PIN), or cardholder name with expiry. Scope reduction options include tokenization (replace PAN with a token at the point of capture), P2PE (encrypt at terminal so the PAN never hits your systems), and hosted payment pages (iFrame or redirect to payment processor).

Scope mapping deliverable: a network diagram showing CDE boundaries, all in-scope systems, all connected systems, and all third-party service providers with system access. This diagram is a required artifact for any assessment.

Data flow diagram: document exactly where PAN enters your environment, where it goes, where it is stored, and where it exits. Every unique flow is a potential scope expansion.

Segmentation validation: confirm the CDE is network-isolated from out-of-scope systems using firewall rules, VLANs, or equivalent controls. Segmentation must be tested -- an untested segmentation claim is not accepted by QSAs.

Requirements 1-2: Network and System Hardening

Requirement 1 covers firewall controls: firewalls between the CDE and the internet, between the CDE and the internal corporate network, and deny-all with explicit permit rules. Ruleset reviews are required every 6 months.

Requirement 2 covers system hardening: no vendor default passwords on any in-scope system, unnecessary services disabled, and current security configuration standards applied. CIS Benchmarks are the most practical implementation guides for each OS and platform type.

Key deliverables: network diagram showing all firewall placement and approved rulesets; documented system configuration standards for each system type in the CDE; evidence of ruleset review. These are the first documents a QSA will request.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Requirements 3-4: Protecting Cardholder Data

Requirement 3: Do not store SAD after authorization. Full track data, CVV, and PIN must never be retained. PAN storage requires strong encryption at rest.

Encryption options for PAN at rest: AES-256 is the standard choice. Key management is covered under Requirement 3.7 and requires documented key custodians, key rotation procedures, and secure key storage.

Requirement 4: Encrypt PAN in transit using TLS 1.2 or higher only. SSL, TLS 1.0, and TLS 1.1 are explicitly prohibited.

TLS verification command:

openssl s_client -connect [host]:443 2>/dev/null | grep -E "Protocol|Cipher"

Quick check for accidentally stored SAD in logs:

grep -r "[0-9]\{16\}" /var/log/

This is a crude first sweep -- false positives are common, but true positives are urgent findings.

Requirements 7-8: Access Control and Identity

Requirement 7: Need-to-know access to cardholder data. Role-based access control with documented roles and access justification for each role that can reach CDE systems.

Requirement 8: Unique IDs for all users. MFA is now required for all access into the CDE -- this is a significant v4.0 expansion from v3.2.1, which required MFA only for remote access.

MFA requirement scope: any user account with the ability to access CDE systems must authenticate with a second factor. This includes administrators, support staff, and any automated accounts with interactive logon capability.

Service accounts: fully inventoried, unique passwords per account, interactive logon disabled where possible. Generic or shared service accounts are a common finding.

Password policy requirements: 12 characters minimum, complexity requirements, 90-day maximum rotation (or equivalent compensating control documented and approved by QSA).

Requirements 10-11: Logging and Testing

Requirement 10: Centralized logging for all CDE systems. Log retention: 12 months total, with 3 months immediately available for analysis. Logs must cover all user access, administrative actions, and security events.

Requirement 11 testing cadence:

  • Internal vulnerability scans: quarterly and after every significant change
  • External ASV scans: quarterly (ASV must be an approved vendor from the PCI SSC list)
  • Penetration test: annually and after significant network changes

New in v4.0: Requirement 11.6.1 -- monitor payment page HTTP headers and scripts for unauthorized changes. Implement a change detection mechanism for all scripts running on payment pages.

Requirement 11.3.1 scoping note: document your definition of "significant change" in a written policy. Undocumented change criteria are a common finding during assessments.

Requirement 12: Policy and Documentation

Required policy documents for PCI compliance: information security policy, acceptable use policy, incident response plan, vulnerability management policy, and access control policy. Each must be reviewed and approved at least annually.

Incident response plan must be tested at least once per year. A tabletop exercise qualifies -- it does not require a live drill.

Third-party service providers: maintain a documented list of all providers with access to CHD or who could impact CDE security. Confirm their PCI compliance annually (Requirement 12.8). Get written acknowledgment of their responsibility for applicable controls.

90-Day Roadmap

Days 1-14: Scoping and data flow mapping. Engage a QSA early for scoping guidance -- many QSAs offer free pre-assessment calls. The cost of a scope mistake discovered during the assessment is far higher than an early consulting call.

Days 15-30: Close critical Requirement 1-4 gaps. Network segmentation validation, TLS 1.2+ enforcement everywhere, confirm no SAD stored post-authorization.

Days 31-45: Access control and MFA rollout (Requirements 7-8). Build the inventory of all accounts with CDE access. Enforce MFA for all of them.

Days 46-60: Logging infrastructure (Requirement 10). SIEM integration for all CDE systems. Verify log retention meets the 12-month / 3-month-available requirement.

Days 61-75: Run internal vulnerability scan. Schedule ASV external scan (ASV scans take time to schedule -- book early). Engage a penetration testing firm.

Days 76-90: Policy documentation complete. Third-party service provider list compiled and compliance confirmations in progress. Complete the SAQ or prepare the ROC package for QSA review.

The bottom line

PCI DSS compliance is a scoping problem before it is a controls problem. Reduce your CDE to the minimum systems that must touch payment data, then apply the 12 requirements to that smaller surface. The organizations that fail assessments almost always have scope that is larger than they thought: undocumented systems that store PAN, unclear segmentation boundaries, or third-party connections that were never mapped.

Frequently asked questions

What changed between PCI DSS v3.2.1 and v4.0?

v4.0 adds 64 new requirements (51 were immediate, 13 were future-dated to March 2025), introduces customized implementation as an alternative to defined approach, expands MFA requirements, and adds new requirements for phishing and web-skimming attacks (Requirement 6.4.3 and 11.6.1).

How do I determine my PCI DSS scope?

Scope includes all system components that store, process, or transmit cardholder data (CHD) plus all systems that could impact the security of those components. The fastest way to reduce scope is to use a validated P2PE solution or hosted payment page that keeps CHD entirely off your network.

What is the difference between SAQ A, SAQ A-EP, SAQ B, and SAQ D?

SAQ A: fully outsourced card-not-present merchants. SAQ A-EP: outsourced payment processing but your website redirects or frames payment. SAQ B: imprint machines or standalone dial-out terminals. SAQ D: everything else. SAQ D has all 12 requirements and 300+ individual controls.

What is the customized implementation option in PCI DSS v4.0?

An alternative to following the defined approach prescriptively. You design a control that meets the stated objective, document your reasoning, and your QSA validates that it achieves the objective. Useful for mature security programs with existing controls that do not match PCI's prescriptive language.

How often do I need to run vulnerability scans under PCI DSS v4.0?

Internal scans: quarterly and after significant changes (Requirement 11.3.1). External scans: quarterly by an Approved Scanning Vendor (ASV) (Requirement 11.3.2). Penetration tests: annually and after significant network changes (Requirement 11.4.1).

What is Requirement 6.4.3 and what does it mean for my website?

All payment page scripts must be managed and reviewed quarterly. You must maintain an inventory of scripts, have a documented justification for each one, and confirm integrity (using SRI hashes or equivalent). This requirement targets Magecart-style web-skimming attacks.

Do I need a QSA or can I self-assess?

Level 1 merchants (over 6 million Visa/Mastercard transactions per year) require an annual Report on Compliance (ROC) by a QSA. Level 2 through 4 merchants can typically self-assess using the appropriate SAQ. Check your card brand requirements directly -- Visa and Mastercard may have different thresholds.

Sources & references

  1. PCI Security Standards Council -- PCI DSS v4.0
  2. PCI DSS v4.0 Summary of Changes
  3. PCI DSS SAQ Information
  4. NIST SP 800-53 Security Controls
  5. Verizon Payment Security Report

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.