• Skip to primary navigation
  • Skip to main content
  • Skip to footer
ControlCase No Tag LOGO md

ControlCase

IT Certifications, Continuous Compliance and Cybersecurity Services Provider

  • Company
    • About Us
    • Careers
    • Locations
    • Team
  • Industries
    • Business Process Outsourcing
    • Cloud Service Providers
    • Retail
    • Telecom | Entertainment
    • Managed Service Providers
  • Certifications
    • PCI DSS Certification
    • CSA STAR Certification
    • GDPR Assessment
    • HIPAA Assessment
    • HITRUST Certification
    • ISO 27001 Certification
    • FedRAMP 3PAO Services and NIST 800-53
    • CMMC Certification
    • MARS-E Assessment
    • PCI SSF
    • P2PE Certification
    • SOC2 Report
  • Solutions
    • Continuous Compliance Solution
    • One Audit
    • Card Data Discovery Software
    • Data Security Rating
  • Testing
    • Application Reviews
    • Application Security Training
    • Code Reviews
    • Card Data Discovery
    • External Vulnerability Scans
    • Firewall Security Reviews
    • Internal Vulnerability Scans
    • Log Monitoring
    • Penetration Testing
  • Resources
    • Events
    • News
    • Webinars
    • Courses
    • Blog
    • Tools
    • Become a Partner
  • Contact Us
  • English

PCI DSS v4.0 New Requirements Assessment Alert and Offer

You are here: Home / Blog / PCI DSS v4.0 New Requirements Assessment Alert and Offer
PCI DSS v4.0.1 New Requirements Cheat Sheet
Get it for FREE

As the landscape of cyber threats continues to evolve, it becomes increasingly critical for businesses that handle cardholder data to proactively implement robust security measures to safeguard sensitive information. In this regard, ControlCase offers expert assistance and support in establishing and maintaining comprehensive security protocols to protect cardholder data from potential risks and breaches.

The deadline for meeting the final 51 PCI DSS v4.0 “best practices” requirements is fast approaching as we near the end of 2024. Does your company need to be compliant? After March 31, 2025, all certifications will be required to adhere to the updated standards. New requirements are currently best practices but will be mandatory in March. ControlCase can help! Make sure everything is in place before the deadline.

PCI DSS v4.0

PCI Data Security Standard (PCI DSS) is a global standard that establishes baseline technical and operational requirements to safeguard account data. The latest iteration of the standard, PCI DSS v4.0, is now accessible.

PCI DSS v4.0 New Requirements

Requirement 1: Install and maintain network security controls

Network security controls (NSCs), including firewalls and other network security technologies, serve as enforcement points for network policies. They are responsible for regulating network traffic between various logical or physical network segments (or subnets) based on predefined rules or policies. While this function has traditionally been fulfilled by physical firewalls, it is now also achievable through virtual devices, cloud access controls, virtualization/container systems, and other software-defined networking technology.

Requirement 2: Apply secure configurations to all system components

Malicious individuals, whether internal or external to an organization, often exploit default passwords and other vendor settings to compromise systems. These well-known passwords and settings can be easily obtained from public information.

Implementing secure configurations for system components is crucial for reducing the vulnerabilities that attackers can exploit to compromise systems. This involves actions such as changing default passwords, eliminating unnecessary software, functions, and accounts, and disabling or removing redundant services. These measures collectively contribute to minimizing the potential attack surface and enhancing overall system security.

Requirement 3: Protect stored account data*

It is important to refrain from storing payment account data unless it is absolutely necessary for the business’s operations. Under no circumstances should sensitive authentication data be retained after authorization has been granted. If your organization maintains Primary Account Numbers (PAN), it is imperative to ensure that they are rendered unreadable. Additionally, if your company retains sensitive authentication data before the authorization process is completed, it is crucial to implement robust protection measures for this data as well.

Requirement 4: Protect cardholder data with strong cryptography during transmission over open, public networks

In order to prevent unauthorized access, it is important to encrypt primary account numbers (PANs) when they are being transmitted over networks that can be easily accessed by malicious individuals, including untrusted and public networks. Malicious individuals often target misconfigured wireless networks and vulnerabilities in outdated encryption and authentication protocols in order to gain privileged access to cardholder data environments (CDE). To protect PAN transmissions, the data can be encrypted before it is transmitted, or the session over which the data is transmitted can be encrypted, or both.

Requirement 5: Protect all systems and networks from malicious software

Malicious software, also known as malware, refers to software or firmware created to infiltrate or harm a computer system without the owner’s knowledge or consent. Its goal is to compromise the confidentiality, integrity, or availability of the owner’s data, applications, or operating system. Examples of malware include viruses, worms, Trojans, spyware, ransomware, keyloggers, rootkits, malicious code, scripts, and links. Malware can enter a network through various business-approved activities, such as employee email (e.g., via phishing) and the use of the internet, mobile computers, and storage devices. This can lead to the exploitation of system vulnerabilities.

Requirement 6: Develop and maintain secure systems and software

Security vulnerabilities in systems and applications can allow criminals to access payment data. Many of these vulnerabilities can be fixed by installing security patches provided by the vendor. These patches quickly repair specific areas of the code. To prevent exploitation, it’s important to have the latest critical security patches installed on all system components. Additionally, patches should be applied to less critical systems within a reasonable timeframe, based on a formal risk analysis. Applications should be developed using secure coding practices, and any changes to systems in the cardholder data environment must follow change control procedures.

Requirement 7: Restrict access to cardholder data by business need-to-know

Unauthorized individuals could potentially access important data or systems due to ineffective access control rules and definitions. To prevent this, it’s crucial to have systems and processes in place to restrict access based on necessity and job responsibilities. “Need to know” means granting access to the minimum amount of data required to perform a job, while “least privileges” means providing only the essential level of privileges needed for a job.

Requirement 8: Identify users and authenticate access to system components*

To maintain security, it’s important to assign a unique ID to each person who has access to ensure that actions taken on critical data and systems can be traced back to authorized users. These requirements apply to all accounts, including point-of-sale accounts, those with administrative capabilities, and all accounts used to view or access payment account data or systems. It’s important to note that these requirements do not apply to accounts used by consumers (cardholders) unless otherwise stated.

Requirement 9: Restrict physical access to cardholder data

Access to cardholder data or systems storing, processing, or transmitting cardholder data must be restricted to prevent unauthorized access or removal of data systems or hardcopies.

Implementation Timeline

Below is the implementation timeline for PCI DSS v4.0.

implementation timeline for PCI DSS v4.0

 

The PCI DSS v4.0 New Requirements Assessment Will Include:

  1. Initial Consultation and Scope Review
  2. Validation of new controls and relevant Documentation Review
  3. Comprehensive Gap Identification
  4. Designing an Actionable Roadmap
  5. Access to ControlCase’s groundbreaking Compliance Hub™ platform

PCI DSS v4.0 Current Best Practices*

Requirements 3 and 8 will be considered best practices until 2025. ControlCase’s offering involves reviewing and evaluating the customer’s current position in relation to the new requirements. The assessment will specifically concentrate on requirements 3 and 8. The objective is to analyze the customer’s current status regarding requirements 3 and 8 to guarantee timely compliance with these mandatory standards by March 2025.

ControlCase’s PCI DSS v4.0 Offerings

ControlCase is the leading provider of cybersecurity services and IT compliance audits. Our offerings include PCI DSS v4.0. We are known for leveraging cutting-edge technology and employing highly skilled personnel to deliver exceptional results.

ControlCase’s Compliance Hub™ enables organizations to achieve compliance with multiple standards simultaneously. The platform streamlines the process by facilitating technology-driven information gathering. It also offers a real-time dashboard that visualizes compliance efforts, allowing teams to communicate progress and needs effectively.

Customers who finish the PCI DSS v4.0 New Requirements Assessment and proceed with ControlCase’s comprehensive PCI DSS Assessment at the gold standard level will be eligible for substantially discounted pricing.

Secure your spot now and make sure that your company is fully compliant with the March 31 PCI deadline for DSS v4.0 requirements.

To learn more, connect with us on LinkedIn, or feel free to reach out to our team of experts at contact@controlcase.com.

Related Blog

Why PCI DSS 4.0 Should Be on Your Radar?
With the release of PCI v4.0, the countdown has started for organizations already PCI DSS Certified to transition from PCI DSS v3.2.1 to the new PCI DSS v4.0 standard. With the timelines of one year to prepare for v4.0 and two years to fully ready for v4.0 future dated requirements, it is time to assess readiness for PCI DSS v4.0 and establish a detailed plan to meet the requirements and timelines.
Aide-Mémoire PCI DSS v4.0
La norme de sécurité des données PCI (PCI DSS) a été établie en 2004 par les principaux émetteurs de cartes de paiement. Elle est maintenue par le Conseil des normes de sécurité PCI. Il fournit des exigences opérationnelles et techniques pour protéger les données des titulaires de cartes.
PCI DSS v4.0
The goals for PCI DSS v4.0 are to continue to meet the security needs of the payment industry, to promote security as a continuous process, to add flexibility for different methodologies, and to enhance validation methods.
Quelles Sont les 12 Exigences de Conformité PCI DSS?
Payment card industry (PCI) compliance is mandated by credit card companies to help ensure the security of credit card transactions in the payments industry. Payment card industry compliance refers to the technical and operational standards that businesses follow to secure and protect credit card data provided by cardholders and transmitted through card processing transactions. The requirements set forth by the PCI SSC are both operational and technical, and the core focus of these rules is always to protect cardholder data.
Log4j Vulnerability and how to remain PCI DSS Compliant
Payment card industry (PCI) compliance is mandated by credit card companies to help ensure the security of credit card transactions in the payments industry. Payment card industry compliance refers to the technical and operational standards that businesses follow to secure and protect credit card data provided by cardholders and transmitted through card processing transactions. The requirements set forth by the PCI SSC are both operational and technical, and the core focus of these rules is always to protect cardholder data.
Importance of building a culture of security and compliance within your organization

About ControlCase 

ControlCase is the global provider of certification, cybersecurity, and continuous compliance services. ControlCase is committed to empowering organizations to develop and deploy strategic information security and compliance programs that are simplified, cost-effective, and comprehensive in both on-premise and cloud environments. ControlCase offers certifications and a broad spectrum of cyber security services that meet the needs of companies required to certify to CBK, CCPA, CJIS 5.9, CMMC, CompTIA Trustmark, EBA, FedRAMP, FFIEC, GDPR, HIPAA, HITRUST, ISO, MARS-E, Microsoft SSPA, NIS2, NIST, PCI DSS, SAQ, SCA, SOC, STAR, Survelliance, SWIFT.  


  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Footer

Connect

Corporate Headquarters
3975 FAIR RIDGE DR STE T25S-D
FAIRFAX, VA 22033

Send us a message

Call Us

Search

About Us

ControlCase is a United States based company, headquartered in Fairfax, Virginia with locations in North America, Europe, Latin America, Asia/Pacific, Australia and the Middle East to serve our clients globally.

Quick Links

  • Company
  • Careers
  • Locations
  • Covid-19 Notice

Certifications, Assessments and Reports

  • PCI DSS Certification
  • CSA STAR Certification
  • GDPR Assessment
  • HIPAA Assessment
  • HITRUST Certification
  • ISO 27001 Certification
  • FedRAMP and 3PAO Services
  • MARS-E Assessment
  • PCI SSF
  • P2PE Certification
  • SOC2 Report

© ControlCase LLC 2025 | Privacy Policy | Impartiality Statement | Legal Notices

  • English
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}