Sunset of PCI DSS v4.0 on 31 December 2024: Get Ready!

5. December 2024

PCI DSS v4.0: In March 2024, version 4.0 of the Payment Card Industry Data Security Standard became mandatory after a two-year transition phase. Just a few months later, version 4.0.1 was released as a minor update of the standard, which will become mandatory on January 1, 2025. The sunset date for version 4.0 is therefore imminent. In this blog post, we have summarized what you need to consider in this context and which other deadlines you should be aware of.

Version 4.0 says goodbye, the future-dated requirements remain

New requirements were introduced in version 4.0, some of which have a separate deadline as “Future-Dated Requirements”: These new requirements will only become mandatory from 01.04.2025. Until then, their implementation is merely recommended as best practice.

You can find everything you need to know about future-dated requirements in our news blog:

https://www.usd.de/en/pci-dss-future-dated-requirements/

and on our YouTube channel:

https://www.youtube.com/watch?v=HVxjqgfXF2U

Nothing really changes with 4.0.1. Or does it?

In version 4.0.1, the PCI Council has incorporated feedback and queries from the Board of Advisors, the Global Executive Assessor Round Table and leading participating organizations. In particular, the objectives and intentions behind certain requirements have been clarified.

Does this have any impact on the measures implemented as part of 4.0.1? Our experienced PCI QSAs have taken a close look at the standard and summarized the most important hidden innovations for you here:

Requirement 3.5.1.1

This requirement stipulates that stored PANs must be rendered illegible. According to PCI DSS v4.0.1, this can now be solved using a customized approach (“Cleartext PAN cannot be determined from hashes of the PAN.”). Instead of using keyed cryptographic hashes, alternative solutions can be used that fulfill the same purpose, such as hashes with secret salts. It is important that all key management processes continue to apply.

Requirement 3.5.1.2

This requirement states that encryption of PANs at hard disk or partition level is not permitted, except for removable media. A new customized approach now allows alternative methods that were previously not possible. In addition, all encryption methods that display PANs in plain text without prior authentication must comply with the new requirements.

Requirement 8.4.2

Requirement 8.4.2, new in PCI DSS v4.0, requires multi-factor authentication for all access to the cardholder data environment (CDE), whereas previously this only applied to administrative access. Version 4.0.1 specifies that this does not apply to console access and that the requirement does not apply if phishing-resistant authentication factors such as FIDO2 are used.

Requirement 6.3.3

Requirement 6.3.3 (version 4.0.1) stipulates that updates for critically classified vulnerabilities must be installed within one month. In version 4.0, this deadline applied to both highly and critically classified vulnerabilities.

Requirement 9.3.4

The new physical security regulation requires separate visitor logs for facilities and sensitive areas that store credit card data. Previously, only one common log was required. For example, a visitor log must be kept for both entry to a building and access to a server room if credit card data is stored there.


Do you need help preparing for or implementing PCI DSS v4.0.1 in your company? Get in touch - our experts are happy to help.

Also interesting:

DORA Countdown: One Month Left Until the Deadline

DORA Countdown: One Month Left Until the Deadline

DORA, the Digital Operational Resilience Act, will fully apply as of 17 January 2025. We have summarized everything you need to know about the EU regulation, preparation and best practices from our news blog.

Top 3 Vulnerabilities in SSO Pentests

Top 3 Vulnerabilities in SSO Pentests

During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to corporate security. They increasingly encounter the same vulnerabilities. Our blog series "Top 3 Vulnerabilities" presents...

Categories

Categories