With all future-dated requirements under the Payment Card Industry Data Security Standard version 4.0.1 (PCI DSS v4.0.1) now effective, organizations are entering a new stage of comprehensive compliance. The focus shifts from preparation to execution, assessing every control and process so it aligns with the full intent of the standard. Our PCI team answers some of the most frequently asked questions about PCI DSS v4.0.1.
In PCI DSS v4.0 the definition was expanded to include some system components that had not previously been included within scope. Newly considered systems include software deployment and configuration management tools such as:
While some companies might not have these types of technology in place currently, the systems are worth noting in case these technologies are used in the future. Also, applicable requirements have expanded for tools already in scope, including anti-malware tools, logging and security information and event management tools, and authentication and authorization tools.
The annual confirmation of the PCI scope must be performed independently by the assessed entity itself, separately from any scoping evaluation performed by the assessor. The scope from both the entity and the assessor should align, and any differences must be specifically noted in Section 3.1 of the report on compliance (ROC) executive summary. This is a separate requirement from simply maintaining an inventory of in-scope systems.
Elements of the requirement are:
This requirement is meant to emphasize a proactive approach for ongoing internal PCI focus.
Performing a comprehensive scoping exercise can be a significant effort, depending on the size of the organization. It’s important to define a consistent and repeatable methodology to complete that scoping.
While numerous publications cover determining scope, guidance on performing a scoping exercise is limited. Some actions to take in identifying the initial scope include:
A variety of data flow and network diagrams are required under PCI standards, including:
To determine the relevant data to capture for each of these diagrams, organizations can start by identifying:
While no single approach will be applicable for every organization, it’s important to evaluate the current scope and establish processes to make the right individuals aware of any scope changes. Consider the details required within the report on compliance executive summary as part of scoping and inventory management, including a business overview, network and data diagrams, account data flows, and in-scope components, networks, locations, and business processes.
Some requirements (6.4.3, 11.6.1) are designed to further protect online payment pages from both malicious scripts and unauthorized modification. Scripts that are in use must be authorized and have their integrity validated, and methods must be in place to detect any changes to payment page contents and HTTP headers. These requirements are applicable to fully in-scope payment pages as well as payment pages that contain embedded payment forms, and they are designed to combat e-commerce skimming and payment page substitution.
A risk-based approach for certain requirements allows an entity to define the frequency of occurrence for certain controls. Targeted risk analyses are required to determine the frequency of controls and must be updated at least annually.
One requirement prevents the relocation of a PAN when using remote access technologies. A change in policy or procedure does not achieve this requirement; prevention must be achieved via a technical control. This requirement is designed to prevent a PAN from being moved to systems not designed for PAN storage and includes any remote technology that provides access to a PAN – for example, remote or virtual desktops and secure socket shell sessions.
Consider engaging with a third party that has a deep understanding of these requirements and can help create a specific and detailed plan for compliance with PCI DSS v4.0.1.
This article was originally published on April 22, 2024, and was reviewed and updated.
Wondering how to implement the PCI DSS v4.0.1 standards in your organization? See how we can help identify the right PCI compliance solution for your business.