Learning Center June 19, 2025 Reading Time: 6 minutes

What Are the Key Steps to Achieve PCI DSS 4.0 Compliance?

PCI DSS 4.0: What Changed and Why It Matters

The Payment Card Industry Data Security Standard (PCI DSS) sets the baseline for how organizations protect cardholder data. Version 4.0, which introduced major updates as of March 2025, provides a significant shift in how businesses implement, assess, and maintain security—especially as payment systems become increasingly cloud-based and distributed.

With new updates in 2025, organizations must understand the new requirements and adjust security practices to remain compliant.

Who Must Comply With PCI DSS?

PCI DSS applies to any organization that stores, processes, or transmits cardholder data. This can include:

  • Retailers and e-commerce businesses
  • Payment gateways and processors
  • Cloud service providers hosting payment environments
  • Financial institutions and third-party vendors supporting payment systems

Compliance obligations vary based on transaction volume.

Key Changes Introduced in PCI DSS 4.0

PCI DSS 4.0 builds on version 3.2.1 but introduces a more flexible and dynamic approach with over 50 updates—the first major update to the standard in over a decade. Several changes include:

  • Customized Approaches: Organizations can implement alternative controls if they achieve the original requirement
  • Mandatory Multi-Factor Authentication (MFA): Required for all users accessing the cardholder data environment (CDE)
  • Password Length: Password length is expanded to 12 characters
  • Vulnerability scans: Some ecommerce entities using the Self-Assessment Questionnaire A are to conduct vulnerability scans at least monthly and address all findings—even those not ranked critical
  • Expanded Logging and Monitoring: More log requirements are included in the latest version, including requirements to respond promptly to failures of security control systems
  • Cryptographic Enhancements: Stronger encryption review requirements with reviews at least once annually

In total, PCI DSS 4.0 introduces 64 new or revised requirements, 51 of which became active in March of 2025. The latest version also adds several service provider requirements, including a requirement to document PCI DSS scope every six months and a requirement (in some cases) to change passwords every 90 days.

Step-by-Step Path to Compliance

Step 1: Determine Applicability

Confirm whether your business handles cardholder data directly or indirectly. If so, PCI DSS compliance applies. Even if cardholder data flows through a third-party system, shared responsibility models still require your attention.

Step 2: Conduct a Gap Assessment

Before making changes, assess how your PCI DSS 3.2.1 controls align with 4.0 and subsequent updates. Map your existing posture to new requirements, including the ones that went into effect in March of 2025, and identify areas where:

  • Compensating controls no longer qualify
  • Access policies need to be restructured
  • Vendor environments must be reassessed
  • Other security control and basic cyber hygiene processes must be updated

Step 3: Enforce Strong Authentication and Access Controls

PCI DSS 4.0 mandates MFA for all users accessing the CDE—including third-party vendors. Additional access control requirements are included in the standard, such as password length requirements.

Integrating Identity Providers (IdPs) and Privileged Access Management (PAM) tools can help organizations meet requirements.

Step 4: Encrypt Cardholder Data

Organizations must review cryptographic cipher suites at least one a year. For Primary Account Numbers (PAN), organizations must ensure certificates used over open, public networks are not expired or revoked.

Step 5: Improve Logging and Monitoring

Organizations should maintain diligent logs and audit current practices against benchmarks in the standard. Organizations must:

  • Automate log reviews
  • Promptly address all failures of critical security control systems, such as anti-malware solutions or IDS/IPS
  • Note all access to audit logs, as hackers can tamper with audit logs to hide their tracks
  • Monitor for unauthorized access and anomalous behavior
  • Retain logs for a minimum of 12 months

Step 6: Evaluate Service Provider Risk

Third-party vendors with access to cardholder data can pose significant risk. As a result, companies that outsource payment operations to third parties are still responsible for ensuring protection of card information with third parties.

  • Consider conducting enhanced vendor assessments and due diligence to clearly define PCI DSS responsibilities
  • Run ongoing monitoring, not just point-in-time checks
  • Third-party service providers must undergo annual PCI DSS assessments, and if they fail to do so, they must complete multiple, on-demand assessments

Step 7: Consider the Customized Approach

Organizations may choose a customized control model, which the standard acknowledges could allow more flexibility in implementation and enable organizations to innovate with security controls. However, it requires detailed documentation, testing, and targeted risk analysis. To adopt the customized approach, organizations must:

 

  • Document the security objective
  • Demonstrate equivalent or better risk reduction
  • Test the customized control to prove its effectiveness
  • Perform a targeted risk analysis for each customized control

There are several other steps required for organizatoins implementing the customizable approach, which are detailed more thoroughly in the standard. Organizations should document any compensating controls so they can be reviewed and validated by the assessor as well.

Organizations may mix and match the customized and defined approaches where appropriate.

Final Thoughts

PCI DSS 4.0 marks the most significant update to PCI DSS in over a decade. It reflects the shift towards cloud infrastructure, third-party reliance, and real-time monitoring. Success hinges not just on passing assessments, but on adopting a proactive, risk-based security culture. Organizations that embrace continuous compliance and not just annual checklists will be best positioned to protect cardholder data and meet evolving regulatory demands.

SecurityScorecard can help organizations align with PCI DSS 4.0 obligations by continuously monitoring vendor risk, surfacing noncompliant configurations, and supporting validation efforts with data-driven evidence.

Tune in to a webinar discussion here to learn about important compliance measures that can help organizations safeguard sensitive data, maintain customer trust, and avoid costly penalties.

Transform Third-Party Risk into a Supply Chain Resilience

With SecurityScorecard’s Supply Chain Detection and Response (SCDR), gain actionable insights into your vendors’ security postures. Our platform empowers you to make informed decisions, ensuring compliance and strengthening your supply chain’s cybersecurity.


🔗 Explore SCDR

Frequently Asked Questions

When is the PCI DSS 4.0 deadline?

Updates to PCI DSS 4.0 rolled into place March 31, 2025. All future-dated requirements become mandatory by this deadline.

Does PCI DSS apply to SaaS vendors?

Yes, if the SaaS provider stores, processes, or transmits cardholder data—or supports systems that do.

When can my organization use the customized approach to PCI DSS?

Organizations may use the customized approach for some measures, while using a defined approach for others. The level of documentation required in order to run the customized approach is greater.

default-img
default-img

Begin your odyssey to understand and reduce cyber risk

Request a Demo