New PCI DSS 4.0 Credit Card Requirements Effective April 1, 2025

New PCI DSS 4.0 Credit Card Compliance Requirements Effective April 1, 2025

Overview


Learn more about PCI DSS 4.0 and its impact on organizations in 2025 in this Q&A.


As of April 1, 2025, all merchants and third-party service providers (TPSPs) involved in processing credit or debit card payments must fully adhere to the enhanced security requirements outlined in the Payment Card Industry Data Security Standard 4.0 (PCI DSS 4.0). Requirements marked “best practice” are no longer optional and must be fully implemented and tested. PCI DSS 4.0 was years in the making and intended by the card brands and others to reduce card fraud by instilling more robust security and policy standards. The April 1 date was the culmination of various grace periods and the PCI Security Council’s staged implementation of PCI DSS 4.0.

If your organization has not yet achieved compliance with PCI DSS 4.0, it is imperative to take action to avoid potential fines, penalties, and assessments.

In Depth


UNDERSTANDING PCI DSS AND ITS APPLICABILITY

PCI DSS is a comprehensive set of security standards designed to ensure that all entities involved in processing, storing, or transmitting payment card information maintain a secure environment. This standard applies universally to all merchants and TPSPs, regardless of the method used for card processing – be it e-commerce platforms, call centers, in-store payment terminals, or other channels. Even TPSPs that can affect the security of card processing or the card processing environment are required to comply with PCI DSS.

KEY OBLIGATIONS UNDER PCI DSS 4.0

With the enforcement date of April 1, 2025, now in effect, organizations must ensure they have implemented critical requirements. Examples include the following:

  1. Defining PCI DSS Scope: Organizations must annually (or every six months for TPSPs) define and document the scope of their PCI DSS assessment. This involves identifying all system components, people, and processes that interact with cardholder data, and ensuring that roles and responsibilities across multiple controls are clearly documented.
  2. Payment Page Scripts: Organizations must implement controls for all payment page scripts executed in consumers’ browsers to prevent unauthorized modifications and potential data breaches.
  3. Automated Technical Solutions: Organizations must deploy automated solutions for public-facing web applications to continually detect and prevent web-based attacks.
  4. TPSP Monitoring and Response: Organizations must enhance monitoring capabilities and establish protocols for obtaining and reviewing documentation from TPSPs to ensure their compliance and promptly address any security incidents.
  5. Targeted Risk Analyses: Organizations must conduct targeted risk analyses for several controls, necessitating granular assessments to identify and mitigate specific vulnerabilities within the cardholder data environment.
  6. Enhanced Encryption Requirements: Organizations must implement robust encryption measures, especially when using whole-disk encryption, to protect cardholder data effectively.

ADDRESSING COMMON MISCONCEPTIONS

It is crucial to dispel certain misconceptions surrounding PCI DSS 4.0 compliance:

  • Outsourcing Card Functions Does Not Relieve a Merchant of PCI DSS Obligations: Even if your organization outsources card processing functions to third-party platforms and does not store card numbers, you are still obligated to complete an annual PCI Self-Assessment Questionnaire (SAQ) and document an Attestation of Compliance (AOC). Outsourcing card functions does not exempt merchants from PCI DSS responsibilities.
  • PCI DSS Compliance Requires More than IT Department Input: PCI DSS 4.0 is not solely a technology standard confined to the IT department. It encompasses a variety of risks associated with people, processes, and technology. Achieving compliance often requires a collaborative approach involving multiple departments, including legal, compliance, procurement, vendor management, and IT security.

IMPACT ON THIRD-PARTY VENDORS AND SERVICE PROVIDERS

With the enforcement of PCI DSS 4.0, there is an increased emphasis on the security of third-party vendors and service providers. Organizations must ensure that their partners are also compliant with the new standards. This involves conducting thorough due diligence, establishing contractual agreements that mandate compliance, obtaining third-party AOCs, and regularly assessing third-party security practices.

Compliance with PCI DSS 4.0 may take significant effort – concerted, focused, and prompt action is necessary, given that the April 1, 2025, deadline has passed. Noncompliance can result in significant financial penalties, legal ramifications, and damage to your organization’s reputation. All entities subject to PCI DSS 4.0 should prioritize conducting a comprehensive gap analysis, updating security policies, implementing required technical controls, and training staff on new procedures to align with PCI DSS 4.0 requirements. By understanding these risks and taking appropriate measures to mitigate them, companies can ensure a smooth transition to the new PCI 4.0 standards and maintain a strong security posture.