PCI DSS 4.0 Changes
Learn about the new requirements coming up in PCI DSS 4.0
PCI DSS 4.0, the latest version of the Payment Card Industry Data Security Standard, marks a significant evolution in the standards set for the protection of cardholder data. This comprehensive update aims to address the ever-changing threat landscape, incorporating new technologies and methodologies for securing payment data. This blog post delves into the key aspects of PCI DSS 4.0, including its requirements, timeline, changes from the previous version, and specific guidelines regarding password and encryption standards. In this post, PAN is shorthand for Primary Account Number (aka Card Number).
The PCI Security Standards Council (PCI SSC) officially released PCI DSS 4.0 in March 2022. Organizations have been given a transition period to migrate from PCI DSS 3.2.1 to 4.0. The transition timeline allows for a phased approach, with full enforcement of the new standard expected by March 2025. This period is designed to give entities sufficient time to understand the new requirements, assess their current security posture, and implement necessary changes without rushing, thereby ensuring a smooth transition.
The effective date for PCI DSS 4.0 was March 2022, with a transition period extending to March 2025. During this period, organizations are expected to migrate their compliance efforts from the previous version to the new standard, ensuring that they fully understand and implement the updated requirements.
Comparing PCI DSS 4.0 to its predecessor, 3.2.1, the latest version introduces significant enhancements in flexibility, security practices, and technological adoption. The shift towards a customized approach to compliance, stronger authentication requirements, and updated encryption standards highlight the PCI SSC's commitment to adapting the standard to the current threat environment and technological landscape.
PCI DSS 4.0 represents a major step forward in securing payment environments, acknowledging the need for flexibility in achieving security objectives while maintaining a high standard for protecting cardholder data. As organizations transition to this new standard, the emphasis on continuous security, adaptability, and robust control measures will play a critical role in safeguarding the payment ecosystem against emerging threats.
Please see below summary of new requirements for PCI DSS 4.0
Technical controls to prevent copy and/or relocation of PAN (Primary Account Number aka Card number) when using remote-access technologies except with explicit authorization.
3.4.2 When using remote-access technologies, technical controls prevent copy and/or relocation of PAN (Primary Account Number aka Card number) for all personnel, except for those with documented, explicit authorization and a legitimate, defined business need.
Strac Endpoint & SaaS/Cloud DLP can achieve this new requirement by automatically scan and redact/block/delete sensitive PCI data in files (pdf, jpeg, png, images, docx, xlsx, screenshots). It has its Endpoint DLP: https://www.strac.io/endpoint-dlp and also SaaS/Cloud DLP integrations: https://www.strac.io/saas-dlp
Relocation of PAN (Primary Account Number aka Card number) to unauthorized storage devices is a common way for this data to be obtained and used fraudulently. Methods to ensure that only those with explicit authorization and a legitimate business reason can copy or relocate PAN minimizes the risk of unauthorized persons gaining access to PAN.
PAN (Primary Account Number aka Card number) cannot be copied or relocated by unauthorized personnel using remote-access technologies.
Storing or relocating PAN (Primary Account Number aka Card number) onto local hard drives, removable electronic media, and other storage devices brings these devices into scope for PCI DSS. A virtual desktop is an example of a remote-access technology. Storage devices include, but are not limited to, local hard drives, virtual drives, removable electronic media, network drives, and cloud storage.
Hashes used to render PAN (Primary Account Number aka Card number) unreadable are keyed cryptographic hashes of the entire PAN with associated key management processes and procedures.
3.5.1.1 Hashes used to render PAN (Primary Account Number aka Card number) unreadable are keyed cryptographic hashes of the entire PAN, with associated key-management processes and procedures in accordance with Requirements 3.6 and 3.7.
Strac Endpoint & SaaS/Cloud DLP can achieve this new requirement by automatically redacting sensitive PCI data in files (pdf, jpeg, png, images, docx, xlsx, screenshots) by removing original PCI data and replacing it with a link to Strac Vault. It has its Endpoint DLP: https://www.strac.io/endpoint-dlp and also SaaS/Cloud DLP integrations: https://www.strac.io/saas-dlp
Relocation of PAN (Primary Account Number aka Card number) to unauthorized storage devices is a common way for this data to be obtained and used fraudulently. Methods to ensure that only those with explicit authorization and a legitimate business reason can copy or relocate PAN minimizes the risk of unauthorized persons gaining access to PAN.
PAN (Primary Account Number aka Card number) cannot be copied or relocated by unauthorized personnel using remote-access technologies.
This requirement applies to PANs (Primary Account Number aka Card number) stored in primary storage (databases, or flat files such as text files spreadsheets) as well as non-primary storage (backup, audit logs, exception, or troubleshooting logs) must all be protected. This requirement does not preclude the use of temporary files containing cleartext PAN while encrypting and decrypting PAN.
Incident response procedures are in place and initiated upon detection of PAN (Primary Account Number aka Card number).
12.10.7 Incident response procedures are in place, to be initiated upon the detection of stored PAN (Primary Account Number aka Card number) anywhere it is not expected, and include:
• Determining what to do if PAN is discovered outside the CDE, including its retrieval, secure deletion, and/or migration into the currently defined CDE, as applicable.
• Identifying whether sensitive authentication data is stored with PAN.
• Determining where the account data came from and how it ended up where it was not expected.
• Remediating data leaks or process gaps that resulted in the account data being where it was not expected.
Having documented incident response procedures that are followed in the event that stored PAN is found anywhere it is not expected to be, helps to identify the necessary remediation actions and prevent future leaks.
Processes are in place to quickly respond, analyze, and address situations in the event that cleartext PAN is detected where it is not expected.
Having documented incident response procedures that are followed in the event that stored PAN is found anywhere it is not expected to be, helps to identify the necessary remediation actions and prevent future leaks.
Critically evaluating all CDE and connected system components to determine the necessary coverage of PCI DSS. A data discovery tool or methodology can be used to facilitate identifying all sources and locations of PAN, and to look for PAN that resides on systems and networks outside the currently defined CDE or in unexpected places within the defined CDE—for example, in an error log or memory dump file. This approach can help ensure that previously unknown locations of PAN are detected and that the PAN is either eliminated or properly secured.
For all the above new requirements,
Strac is a SaaS/Cloud DLP and Endpoint DLP solution that helps businesses stay PCI DSS compliant with its modern features: