- Complying with new PCI DSS requirements will require significant resources.
- It is unclear how the new PCI DSS requirements will impact your IT environment and business procedures.
- Not meeting compliance obligations will jeopardize trusted relationships.
Our Advice
Critical Insight
- Your PCI compliance program needs to evolve to meet constantly evolving or new requirements.
- It is best to collaborate, start early, and prioritize tasks and initiatives in a way that takes advantage of the PCI DSS v4.0 transition timeline.
Impact and Result
- This approach is a straightforward guide to transitioning from PCI DSS v3.2.1 to v4.0, and is built on the following phases:
- Defining and documenting the scope
- Performing a gap analysis
- Prioritizing and completing tasks and initiatives
- Confirming gaps have been closed
- Defining and documenting the scope
Member Testimonials
After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.
8.0/10
Overall Impact
$2,000
Average $ Saved
1
Average Days Saved
Client
Experience
Impact
$ Saved
Days Saved
CPA Alberta
Guided Implementation
8/10
$2,000
1
Prepare for PCI DSS v4.0
Start early with a collaborative effort for a successful transition to the new version of the PCI DSS.
Analyst Perspective
“…organization will set you free.”
Alton Brown
![]() |
As the threat landscape shifts and risks to organizations evolve, so too must security standards to effectively address current and relevant risks. To that end, the Payment Card Industry Security Standards Council has released version 4.0 of the Data Security Standards, the first major release since 2013. Changes are significant and may be onerous, even to those entities that are compliant with the PCI DSS version 3.2.1. One of the goals of the new version of the PCI DSS is to “promote security as a continuous process” and even though the effort to comply with updated and new requirements may be high, doing so will improve the information security posture of a compliant organization. There may be a lot of work to do but given the generous three-year timeline between the publishing of the new standard and the date all new and updated controls become effective, there is time to tackle the effort in manageable chunks. |
Bob Wilson, CISSP Info-Tech Research Group |
Executive Summary
Your Challenge |
Common Obstacles |
Info-Tech’s Approach |
---|---|---|
|
|
|
Info-Tech Insight
Your PCI compliance program must evolve to meet constantly evolving or new requirements.
It is best to collaborate, start early, and prioritize tasks and initiatives in a way that takes advantage of the PCI DSS v4.0 transition timeline.
PCI DSS Overview
The Payment Card Industry Security Standards Council (PCI SSC) is a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments worldwide.
The PCI Data Security Standard (PCI DSS) is a global standard that provides a baseline of technical and operational requirements designated to protect payment data. PCI DSS v4.0 is the next evolution of the standard.
Build and Maintain a Secure Network and Systems |
1. Install and maintain network security controls 2. Apply secure configurations to all components |
---|---|
Protect Account Data |
3. Protect stored account data 4. Protect cardholder data with strong cryptography |
Maintain a Vulnerability Management Program |
5. Protect all systems and networks from malicious software. 6. Develop and maintain secure systems and software |
Implement Strong Access Control Measures |
7. Restrict access by business need to know 8. Identify users and authenticate access to components 9. Restrict physical access to cardholder data |
Regularly Monitor and Test Networks |
10. Log and monitor all access 11. Test security systems and networks regularly |
Maintain an Information Security Policy |
12. Support information security with organizational policies and programs |
The 4 goals of PCI DSS v4.0
Continue to meet the security needs of the payments industry. |
Promote security as a continuous process. |
Flexibility for entities to achieve security objectives. |
Enhance validation methods and procedures. |
---|---|---|---|
|
|
|
|
What’s different?
Different Approaches |
Security as a Process |
Evolved Requirements |
---|---|---|
Entities may choose requirements are implemented as described in the PCI DSS, |
Version 4.0 of the PCI DSS focuses on promoting data security as a constant process, rather than a periodic event. There are requirements to monitor the effectiveness of controls as part of a |
Requirements were updated or added to address current risks and technologies. Some changes in languages better accommodate cloud services. |
The types of changes
Evolving requirement - Changes to ensure that the standard is up-to-date with emerging threats and technologies, and changes in the payment industry. Examples include new or modified requirements or testing procedures, or the removal of a requirement. |
Clarification or guidance - Updates to wording, explanation, definition, additional guidance, and/or instruction to increase understanding or provide further information or guidance on a particular topic. |
Structure or format - Reorganization of content, including combining, separating, and renumbering of requirements to align content. |
New Requirements
New requirements were added A total of 64 requirements have been added to version 4.0 of the PCI DSS. |
New requirements become effective March 31, 2024 The other 51 new requirements are considered best practice until March 31, 2025, at which point they will become effective. |
New requirements only for service providers 11 of the new requirements are applicable only to entities that provide party services to merchants. |
PCI DSS v.4.0 transition timeline
A transition strategy
![]() |
The Info-Tech difference:
|
PCI DSS v4 compliance road map
- Transition kick-off
- Document and define scope
- Perform gap analysis
- Remediate gaps
- Confirm remediations
Formally kick off the process of transitioning to PCI DSS v 4.0.
Determine the boundaries and components of your cardholder data environment (CDE).
Complete the Self-Assessment Questionnaire (SAQ) to determine gaps or engage a third party.
Prioritize, plan, and execute tasks and initiatives that will close gaps.
Revisit the SAQ and check that gaps have been closed.
1. Transition kick-off
Officially kick off the effort to transition from v3.2.1 to v4.0
Activities
- Communicate the need for change to senior leadership and secure their support.
- Communicate the need for change to your organization.
- Identify a person or group of people responsible for driving the project:
- A small committee representing all relevant business components is highly recommended.
- Assign roles and responsibilities.
- Review the PCI DSS v4 and become familiar with the requirements and objectives.
- Engage with your QSA for guidance.
Info-Tech Insight
Documentation is one of the most important activities in this effort. Be sure to capture details of your communications, scoping, and plans.
Info-Tech Insight
Compliance with the PCI DSS is a business issue and can only be achieved with participation across all business units.
Outcomes of this step
- A mandate for change by senior leadership
- A group of individuals from different business components that will drive the transition
2. Document and define scope
Determine the boundaries and components of the cardholder data environment
Activities
- Identify all components and systems that may store, process, or transmit cardholder data (CHD) or sensitive authentication data (SAD).
- Produce a logical map of the cardholder data environment (CDE). Include:
- All components that may transmit, store, or process CHD/SAD.
- System and network boundaries.
- Traffic flows and connections to other systems or third parties.
- Reduce scope, if possible.
- Segregate your CDE and non CDE systems.
- Eliminate the handling of CHD/SAD where possible.
Info-Tech Insight
Segmentation can significantly decrease the burden of compliance by reducing the size of the environment to which the PCI DSS is applicable.
Info-Tech Insight
Requirement 12.5.2 (effective March 2024) states the entity must document and confirm PCI DSS scope at least once a year or on significant change.
Outcomes of this step
- Documentation of your cardholder data environment.
- Catalog of systems and devices.
Defining scope
Category 1: CDE
|
![]() |
Category 2: CDE adjacent
|
|
Category 3: Everything else Systems that do NOT store, process, or transmit any CHD/SAD and are isolated from Category 1 and Category 2 systems |
3. Perform gap analysis
Do a gap analysis in-house or engage with a third party.
Activities
- Decide if the gap analysis will be performed in-house or by a third party.
- If the decision is to perform the gap analysis in-house, choose the appropriate SAQ for your organization and complete it
- It will be helpful to refer to the previous SAQ.
- Compile a list of requirement gaps that will need to be closed.
Info-Tech Insight
Be careful about engaging your QSA for your gap analysis. Using the same assessor and auditor is not ideal.
Info-Tech Insight
The “Build a Security Compliance Program” blueprint can provide guidance and tools that will help you establish an effective compliance program.
Visit Build a Security Compliance Program
Outcomes of this step
- A list of gaps that need to be closed
4. Remediate gaps
Prioritize, plan, and execute tasks and initiatives that will close gaps
Activities
- Develop a Plan of Actions and Milestones to remediate each identified gap.
- Decide whether you will follow a defined or customized approach.
- Perform a targeted risk analysis for all customized requirements and any defined requirement that allows for flexibility in its frequency.
- Prioritize your Plan of Actions based on the following factors: risk, effort, and timeline.
- Document your Prioritized Plan of Actions and Milestones.
- Execute plans.
Info-Tech Insight
If a strategy for a gap remediation is to follow a customized approach, don’t forget to document the risk assessment for that requirement!
Info-Tech Insight
Go for the “low hanging fruit” for quick wins. Prioritize remediations that can happen very quickly with little to no effort or cost.
Outcomes of this step
- A prioritized Plan of Actions and Milestones
5. Confirm remediation
Check your remediations to ensure they are effective.
Activities
- Confirm the documented scope
- If there were changes to the scope of the cardholder data environment, the scope documentation must be updated to reflect changes.
- Revisit the Self-Assessment Questionnaire or documented results of your gap analysis (see Step 3).
- Re-evaluate the gaps.
- Compile a list of requirement gaps that still need to be closed and carry results back to Step 4.
Info-Tech Insight
The scope documentation must be updated anytime there are major changes to the CDE.
Info-Tech Insight
The new PCI DSS will require additional cost and effort; however, it will also improve the security posture of an organization.
Outcomes of this step
- A completed SAQ.
- Updated scoping documentation, in the event remediations generated changes to the CDE.
Related Info-Tech Research
![]() |
Build a Security Compliance Program This project will guide you through the steps to establishing an effective Security Compliance Program capable of addressing complex requirements of any compliance framework. |
![]() |
Build an Information Security Strategy This project will guide you through the steps to develop and implement an effective Information Security Strategy. |
Bibliography
Contributor:
- SEAN D. GOODWIN, GSE
Manager – DenSecure by Wolf & Company, P.C.
Wolf & Company, P.C
Sources:
“At a Glance: PCI DSS v4.0.” PCI Security Standards Council, LLC, March 2022. Accessed 6 Sep. 2022.
“Payment Card Industry Data Security Standard Requirements and Testing Procedures Version 4.0” PCI Security Standards Council, LLC, March 2022. Accessed 13 Sep. 2022
“Summary of Changes from PCI DSS Version 3.2.1 to 4.0.” PCI Security Standards Council, LLC, March 2022. Accessed 6 Sep. 2022.