{"id":3341,"date":"2024-06-24T15:00:42","date_gmt":"2024-06-24T15:00:42","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=3341"},"modified":"2024-07-09T06:00:33","modified_gmt":"2024-07-09T06:00:33","slug":"what-to-know-about-pci-dss-4-0-and-4-0-1","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/","title":{"rendered":"What You Need to Know About PCI DSS 4.0 (and Version 4.0.1)"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Is your organization ready to comply with the PCI DSS 4.0 requirements that will become effective in March 2025? Here&#8217;s what you need to know to integrate PCI DSS 4.0 (and revisions outlined in version 4.0.1) into your security framework and operations<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/sectigostore.com\/blog\/what-is-pci-dss-a-quick-guide-to-the-12-pci-dss-requirements\/\">Payment Card Industry Data Security Standards<\/a> (PCI DSS) is a set of security fundamentals that helps organizations handling payment card information avoid falling prey to cybersecurity incidents and data breaches. It also ensures they pay the consequences when they do. In 2022, the <a href=\"https:\/\/www.pcisecuritystandards.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Payment Card Industry Security Standards Council <\/a>(PCI SSC) published <a href=\"https:\/\/docs-prv.pcisecuritystandards.org\/PCI%20DSS\/Standard\/PCI-DSS-v4_0.pdf\">PCI DSS version 4.0\u2019<\/a>s <a href=\"https:\/\/blog.pcisecuritystandards.org\/pci-dss-v3-2-1-is-retiring-on-31-march-2024-are-you-ready\">first set of revised and new requirements<\/a>.<a href=\"https:\/\/www.documentcloud.org\/documents\/24705645-ticketmaster_class_action\"><\/a><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ticketmaster-confirms-massive-breach-after-stolen-data-for-sale-online\/\"><\/a><a href=\"https:\/\/docs-prv.pcisecuritystandards.org\/PCI%20DSS\/Standard\/PCI-DSS-v4_0.pdf\"><\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.pcisecuritystandards.org\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a>Many of these standards requirements <a href=\"https:\/\/blog.pcisecuritystandards.org\/pci-dss-v3-2-1-is-retiring-on-31-march-2024-are-you-ready\"><\/a>became effective on March 31, 2024 (with additional \u201cbest practices\u201d that will be mandatory by March 31, 2025). However, in June 2024, they published PCI DSS version 4.0.1, which revises specific requirements to provide clarification and guidance but provides \u201cno additional or deleted requirements\u201d to PCI DSS version 4.0. So, don\u2019t panic.<\/p>\n\n\n\n<p>Now, it&#8217;s time to start preparing for the next PCI DSS 4.0 requirements that\u2019ll kick into effect next year and ensure you\u2019re also taking into account the clarifying revisions published in version 4.0.1.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">PCI DSS 4.0 Phase Two: Dozens of New Requirements to Be Implemented Before Q2 2025<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-4-and-401-timeline-1024x512.png\" alt=\"A timeline showcasing how PCI DSS version 4.0 and amendments in version 4.0.1 roll out in 2024 and 2025 \" class=\"wp-image-3342\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-4-and-401-timeline-1024x512.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-4-and-401-timeline-300x150.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-4-and-401-timeline-560x280.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-4-and-401-timeline-940x470.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-4-and-401-timeline.png 1129w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Image caption: <\/em><a href=\"https:\/\/blog.pcisecuritystandards.org\/at-a-glance-pci-dss-v4-0\"><\/a><em>&nbsp;The graphic shows the deadline for implementing the remaining PCD DSS 4.0 requirements (and when PCI DSS 4.0 will be replaced by v4.0.1).<\/em><\/figcaption><\/figure>\n\n\n\n<p>PCI DSS 4 introduced several <a href=\"https:\/\/docs-prv.pcisecuritystandards.org\/PCI%20DSS\/Standard\/PCI-DSS-v3-2-1-to-v4-0-Summary-of-Changes-r2.pdf\">fundamental changes<\/a> to tackle emerging threats and security issues brought about by new technological advancements since the 2018 release of the previous version, PCI DSS 3.2.1.<\/p>\n\n\n\n<p>PCI DSS version 4.0 includes in total 64 new requirements. With the first phase of 13 new requirements done and dusted, the next stage includes rolling out the remaining 51 new PCI DSS 4.0 requirements. Currently considered &#8220;best practices,&#8221; they\u2019ll come into force no later than March 31, 2025. (NOTE: Not all requirements may apply to you, as some are specific to service providers.)<\/p>\n\n\n\n<p>We get it, that&#8217;s a lot to digest. To help you, we&#8217;ve prepared an overview of these second-phase requirements and a few tips. It&#8217;ll enable you to better understand the new rules and how best to address them.<\/p>\n\n\n\n<p>Check the summary table and\/or go into the nitty-gritty sections below. (NOTE: We skipped listing the new requirements under Principal Requirements #1 and #2 since they went into effect when PCI DSS 4.0 rolled out).<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Changed PCI DSS Version 4.0 Requirements That Are \u201cBest Practices\u201d Until March 31, 2025<\/strong><\/td><td><strong>PCI DSS 4 \u2014 Summary of Changes (New or Amended Requirements)<\/strong><\/td><td><strong>Tips to Help You Comply with Some of These New Requirements<\/strong><\/td><\/tr><tr><td>Requirement 3: Protect Stored Account Data<\/td><td>These changes are related to the protection of <a href=\"https:\/\/www.pcisecuritystandards.org\/glossary\/sensitive-authentication-data\/\">sensitive authentication data<\/a> (SAD) and <a href=\"https:\/\/www.pcisecuritystandards.org\/glossary\/pan\/\">primary account numbers<\/a> (PANs) through encryption and cryptographic hashes.<\/td><td>Use strong <a href=\"https:\/\/www.thesslstore.com\/blog\/what-is-a-hash-function-in-cryptography-a-beginners-guide\/\">cryptographic hash functions<\/a> and algorithms.Limit the usage of disk-level encryption.Ensure secure cryptographic key storage &nbsp;<\/td><\/tr><tr><td>Requirement 4: Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public Networks<\/td><td>These new and amended requirements focus on cryptography-related roles and responsibilities, and certificate and key validity and inventory.<\/td><td>Use certificate management software such as <a href=\"https:\/\/sectigostore.com\/enterprise\/sectigo-certificate-manager\">Sectigo Certificate Manager<\/a> or <a href=\"https:\/\/www.digicert.com\/tls-ssl\/certcentral-tls-ssl-manager\">D<\/a><a href=\"https:\/\/www.digicert.com\/tls-ssl\/certcentral-tls-ssl-manager\">igi<\/a><a href=\"https:\/\/www.digicert.com\/tls-ssl\/certcentral-tls-ssl-manager\">Cert <\/a><a href=\"https:\/\/www.digicert.com\/tls-ssl\/certcentral-tls-ssl-manager\">CertCentral<\/a> to verify the validity of your SSL\/TLS certificates.The same tools will help you keep an inventory of keys and certificates.<\/td><\/tr><tr><td>Requirement 5: Protect All Systems and Networks from Malicious Software<\/td><td>These new clauses emphasize the implementation of regular malware scanning and <a href=\"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/\">phishing<\/a> protection.<\/td><td>Review your components and implement <a href=\"https:\/\/codesigningstore.com\/how-to-harden-your-software-supply-chain-security\">supply chain security best practices<\/a>.Run daily malware scans using only trusted and well-known anti-virus\/malware tools such as <a href=\"https:\/\/sectigostore.com\/sitelock.aspx\">SiteLock<\/a>.Train your users to recognize and avoid phishing scams and malware threats.<\/td><\/tr><tr><td>Requirement 6: Develop and Maintain Secure Systems and Software<\/td><td>New requirements focusing on software security and system threat prevention through automation and secure practices.<\/td><td>Create an <a href=\"https:\/\/www.thesslstore.com\/blog\/sbom-an-up-close-look-at-a-software-bill-of-materials\/\">S<\/a><a href=\"https:\/\/www.thesslstore.com\/blog\/sbom-an-up-close-look-at-a-software-bill-of-materials\/\">BOM<\/a> to list all application\u2019s open source components, their licenses, versions, and patch status. Sign it with a <a href=\"https:\/\/sectigostore.com\/code-signing\/sectigo-code-signing-certificate\">trusted code signing certificate<\/a>.Invest in <a href=\"https:\/\/sectigostore.com\/blog\/how-to-perform-a-website-security-check\/\">Website security checker tools<\/a> like <a href=\"https:\/\/sectigostore.com\/sitelock.aspx\">SiteLock<\/a>. <a href=\"https:\/\/sectigostore.com\/website-security\/hacker-guardian-pci-scan-control-center\">HackerGuardian<\/a> will even monitor your PCI DSS version 4 compliance.Shield your payment page scripts from <a href=\"https:\/\/sectigostore.com\/blog\/what-is-cross-site-scripting-how-to-prevent-cross-site-scripting-attacks\/\">cross-site script<\/a> (XSS) attacks following <a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Cross_Site_Scripting_Prevention_Cheat_Sheet.html\">OWASP\u2019s suggestions<\/a>.<\/td><\/tr><tr><td>Requirement 7: Restrict Access to System Components and Cardholder Data by Business Need to Know<\/td><td>These new requirements address regulated access to systems and cardholder data.<\/td><td>Implement access control policies as described in the <a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html\">OWASP<\/a><a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html\"> Authorization cheat sheet<\/a>.Follow the <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/principle-of-least-privilege-POLP\">principle of the least privilege<\/a> (POLP).Delete unused accounts.<\/td><\/tr><tr><td>Requirement 8: Identify Users and Authenticate Access to System Components &nbsp;<\/td><td>These changes mandate additional measures to secure access and passwords.<\/td><td>Implement <a href=\"https:\/\/aws.amazon.com\/what-is\/mfa\/\">multifactor authentication<\/a> (MFA) wherever possible.Shield credentials from malicious snoopers and <a href=\"https:\/\/www.techtarget.com\/iotagenda\/definition\/man-in-the-middle-attack-MitM\">man-in-the-middle attacks<\/a> (MITM) with an <a href=\"https:\/\/sectigostore.com\/ssl-types\/ov-ssl-certificates\">SSL\/TLS certificate<\/a>.Never hardcode passwords.<\/td><\/tr><tr><td>Requirement 9: Restrict Physical Access to Cardholder Data<\/td><td>This single point highlights the importance of securing all physical <a href=\"https:\/\/www.pcisecuritystandards.org\/glossary\/poi\/\">points of interaction<\/a> (POI and access to cardholder data).<\/td><td>Inspect them regularly.Stay up to date with new threats. Check the NIST <a href=\"https:\/\/nvd.nist.gov\/\">National Vulnerability Database<\/a> (NVD) and <a href=\"https:\/\/cve.mitre.org\/\">MITRE\u2019s <\/a><a href=\"https:\/\/cve.mitre.org\/\">common vulnerabilities exposure (<\/a><a href=\"https:\/\/cve.mitre.org\/\">CVE<\/a>) database.<\/td><\/tr><tr><td>Requirement 10: Log and Monitor All Access to System Components and Cardholder Data<\/td><td>These requirements encompass the actions that are required for effective log management and analysis.<\/td><td>Don\u2019t miss OWASP <a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html#implement-appropriate-logging\">log implementation best practices<\/a>.&nbsp;&nbsp;&nbsp;&nbsp; Automate log analysis and monitoring with the support of <a href=\"https:\/\/signoz.io\/comparisons\/log-analysis-tools\/\">paid <\/a><a href=\"https:\/\/signoz.io\/comparisons\/log-analysis-tools\/\">or<\/a><a href=\"https:\/\/signoz.io\/comparisons\/log-analysis-tools\/\"> open-source log analysis tool<\/a><a href=\"https:\/\/signoz.io\/comparisons\/log-analysis-tools\/\">s<\/a>.Encrypt your log using <a href=\"https:\/\/www.thesslstore.com\/blog\/types-of-encryption-encryption-algorithms-how-to-choose-the-right-one\/\">strong encryption algorithms<\/a>, apply strict <a href=\"https:\/\/doi.org\/10.6028\/NIST.SP.800-192\">access contro<\/a><a href=\"https:\/\/doi.org\/10.6028\/NIST.SP.800-192\">l policies<\/a>, and review them often.<\/td><\/tr><tr><td>Requirement 11: Test Security of Systems and Networks Regularly<\/td><td>The newly added clauses emphasize the need for testing systems and networks to fix all vulnerabilities found and protect payment pages from unauthorized modifications.<\/td><td>Scan systems with <a href=\"https:\/\/sectigostore.com\/sitelock.aspx\">SiteLock<\/a> Pro and Business.Schedule and run over 30,000 vulnerabilities and XSS attack tests with <a href=\"https:\/\/sectigostore.com\/website-security\/hacker-guardian-pci-scan-control-center\">HackerGuardian<\/a>.Implement an alert system for HTTP headers of payment pages and content&#8217;s unauthorized modifications.<\/td><\/tr><tr><td>Requirement 12: Support Information Security with Organizational Policies and Programs<\/td><td>All changes related to this requirement are centered on security policies and programs, including those involving third-party service providers (TPSPs).<\/td><td>Inform your peers and employees.Set up ad hoc training sessions.Review and keep all information up to date.&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">PCI DSS 4.0 \u2014 Requirement 3: Protect Stored Account Data<\/h3>\n\n\n\n<p>According to BlackFog\u2019s latest report, <a href=\"https:\/\/www.blackfog.com\/the-state-of-ransomware-2024\/\">92% of ransomware attacks<\/a> analyzed in the first four months of 2024 were used to extract data. This PCI DSS version 4 section includes new requirements related to the protection of sensitive <a href=\"https:\/\/www.imperva.com\/learn\/data-security\/data-at-rest\/\">data at rest<\/a> (i.e., saved in a digital form). They all align perfectly with BlackFog&#8217;s findings.<\/p>\n\n\n\n<p>Specifically, these changes mandate enterprises to protect <a href=\"https:\/\/www.pcisecuritystandards.org\/glossary\/sensitive-authentication-data\/\">sensitive authentication data<\/a> (SAD) and <a href=\"https:\/\/www.pcisecuritystandards.org\/glossary\/pan\/\">primary account numbers<\/a> (PANs) through <a href=\"https:\/\/sectigostore.com\/blog\/what-is-encryption-and-how-does-it-work\/\">encryption<\/a> and <a href=\"https:\/\/sectigostore.com\/blog\/hash-function-in-cryptography-how-does-it-work\/\">cryptographic hashes<\/a>.<\/p>\n\n\n\n<p>To achieve compliance, you may want to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Use strong mathematical encryption algorithms<\/strong>. Follow <a href=\"https:\/\/csrc.nist.gov\/pubs\/fips\/180-4\/upd1\/final\">industry standards<\/a>. For instance, use the secure algorithm <a href=\"https:\/\/codesigningstore.com\/what-is-the-most-secure-hashing-algorithm\">SHA-256<\/a> to <a href=\"https:\/\/www.thesslstore.com\/blog\/how-secure-is-rsa-in-an-increasingly-connected-world\/\"><\/a><a href=\"https:\/\/www.thesslstore.com\/blog\/you-should-be-using-ecc-for-your-ssl-tls-certificates\/\"><\/a>make PANs and SAD unreadable, and use robust asymmetric algorithms, too. Moreover, get ready for quantum computing by adopting hybrid <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2023\/08\/nist-standardize-encryption-algorithms-can-resist-attack-quantum-computers\">post quantum cryptography (PQC) algorithms<\/a>.<\/li>\n\n\n\n<li><strong>Opt for keyed cryptographic hashes<\/strong>. In other words, use the <a href=\"https:\/\/www.okta.com\/identity-101\/hmac\/\">hash message authentication code<\/a> (HMAC) with two cryptographic keys (computed from one key) to preserve data authenticity and integrity.<\/li>\n\n\n\n<li><strong>Limit the usage of disk-level encryption<\/strong>. Encrypt PAN data only at the disk or partition levels. This way, the data will be indecipherable when stored on removable hardware.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">PCI DSS 4.0 \u2014 Requirement 4: Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public Networks<\/h3>\n\n\n\n<p>Is your website part of <a href=\"https:\/\/transparencyreport.google.com\/https\/overview?hl=en\">96% of <\/a><a href=\"https:\/\/transparencyreport.google.com\/https\/overview?hl=en\">internet Google traffic<\/a> protected by a <a href=\"https:\/\/sectigostore.com\/ssl-certificates\">secure socket layer\/transport layer security<\/a> (SSL\/TLS) certificate? We bet it is. Unfortunately, that isn&#8217;t enough to prevent the bad guys from snooping\/stealing sensitive data transmitted over the network.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Protect your organization and customers from <a href=\"https:\/\/www.rapid7.com\/fundamentals\/man-in-the-middle-attacks\/\">man-in-the-middle attacks<\/a> (MITM).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Check that your SSL\/TLS certificates are still valid<\/strong>. Certificates don&#8217;t last forever. Use certificate management software such as <a href=\"https:\/\/sectigostore.com\/enterprise\/sectigo-certificate-manager\">Sectigo Certificate Manager<\/a> to keep expired or revoked certificates under control. It&#8217;ll be particularly helpful now that Google <a href=\"https:\/\/www.sectigo.com\/resource-library\/google-announces-intentions-to-limit-tls-certificates-to-90-days-why-automated-clm-is-crucial\">has <\/a><a href=\"https:\/\/www.sectigo.com\/resource-library\/google-announces-intentions-to-limit-tls-certificates-to-90-days-why-automated-clm-is-crucial\">announced<\/a> that it might require SSL certificates with a mandatory 90-day validity period.<\/li>\n\n\n\n<li><strong>Keep an inventory of keys and certificates<\/strong>. The same tools we\u2019ve just mentioned will give you a complete and up-to-date picture of all your secrets and <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-private-key-in-cybersecurity\/\">keys<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"750\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/sectigo-certificate-manager-overview.png\" alt=\"An overview of some of the features and benefits of using Sectigo Certificate Manager\" class=\"wp-image-3343\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/sectigo-certificate-manager-overview.png 683w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/sectigo-certificate-manager-overview-273x300.png 273w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/sectigo-certificate-manager-overview-560x615.png 560w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><figcaption class=\"wp-element-caption\"><em>Image source: <a href=\"https:\/\/sectigostore.com\/enterprise\/sectigo-certificate-manager\">SectigoStore.com<\/a>. Take the burden off your staff with Sectigo Certificate Manager. This end-to-end certificate lifecycle management platform will ensure you&#8217;ll never use expired certificates again.<\/em><\/figcaption><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sectigostore.com\/enterprise\/sectigo-certificate-manager\">Get Sectigo Certificate Manager<\/a><\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">PCI DSS 4.0 \u2014 Requirement 5: Protect All Systems and Networks from Malicious Software<\/h3>\n\n\n\n<p>In 2023, the total malware volume identified by SonicWall increased <a href=\"https:\/\/www.sophos.com\/en-us\/content\/state-of-ransomware\">globally by 11%<\/a>. Zscaler discovered <a href=\"https:\/\/www.zscaler.com\/campaign\/threatlabz-phishing-report\">745 million<\/a> more attacks than in 2022. The new clauses included in this group focus on <a href=\"https:\/\/sectigostore.com\/blog\/malware-attack-different-types-of-malware-attacks\/\">malware<\/a> prevention through periodical components evaluation, regular malware scanning, and <a href=\"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/\">phishing<\/a> protection.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Harden the security of your supply chain<\/strong>. ReversingLabs detected a <a href=\"https:\/\/www.reversinglabs.com\/sscs-report\">1,300% increase in malicious components<\/a> in just three years (2020-23). Periodically review your components&#8217; security and implement <a href=\"https:\/\/codesigningstore.com\/how-to-harden-your-software-supply-chain-security\">supply chain security<\/a> best practices.<\/li>\n\n\n\n<li><strong>Scan your software for malware<\/strong>. Run daily malware scans using only trusted antivirus\/antimalware tools such as <a href=\"https:\/\/sectigostore.com\/sitelock.aspx\">SiteLock<\/a>. Use more than one for comprehensive detection. Don\u2019t rely on free scanners as they may be out of date.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"(SMART) SECURE MALWARE ALERT AND REMOVAL TOOL\" width=\"940\" height=\"529\" src=\"https:\/\/www.youtube.com\/embed\/AGvdZjcHRao?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Train your users<\/strong>. <a href=\"https:\/\/www.techrepublic.com\/article\/evilproxy-phishing-attack\/\">EvilProxy<\/a> (a phishing attack that managed to bypass multifactor authentication [MFA]) and <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/email-and-cloud-threats\/cybersecurity-stop-month-qr-code-phishing\">QR code phishing<\/a> are just two examples of the potential consequences of untrained users. Turn click-enthusiast users into cybersecurity guards. <a href=\"https:\/\/www.cisa.gov\/secure-our-world\/teach-employees-avoid-phishing\">Teach <\/a><a href=\"https:\/\/www.cisa.gov\/secure-our-world\/teach-employees-avoid-phishing\">them<\/a> about <a href=\"https:\/\/sectigostore.com\/blog\/common-types-of-phishing-attacks-how-to-recognize-avoid-them\/\">phishing<\/a> and show them how to recognize <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\">phishing emails<\/a> and attacks.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">PCI DSS 4.0 \u2014 Requirement 6: Develop and Maintain Secure Systems and Software<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.secureblink.com\/cyber-security-news\/2-8-m-records-stolen-in-sav-rx-data-breach-what-you-need-to-know\">2.8 million<\/a> personal data of Sav-Rx clients, a pharmacy benefit management company, were stolen in October 2023. A lack of advanced threat detection and monitoring procedures was among the identified vulnerabilities. This confirms the need to focus on threat prevention through automation. Precisely what this section&#8217;s updates are about. Here are our suggestions to help you reach compliance:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Create and request software bills of materials (SBOMs)<\/strong>. SBOMS are gaining popularity, being supported by <a href=\"https:\/\/www.sonatype.com\/state-of-the-software-supply-chain\/software-supply-chain-maturity\">75% of cybersecurity leaders<\/a> in 2023. These detailed breakdowns of software components were included in the U.S. White House\u2018s&nbsp; <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\">Executive Order (EO) 14028<\/a>. Each <a href=\"https:\/\/www.thesslstore.com\/blog\/sbom-an-up-close-look-at-a-software-bill-of-materials\/\">S<\/a><a href=\"https:\/\/www.thesslstore.com\/blog\/sbom-an-up-close-look-at-a-software-bill-of-materials\/\">BOM<\/a> lists all an application\u2019s open source components, licenses, versions, and patch status. It\u2019s an editable file; therefore, once generated, don\u2019t forget to protect its integrity with a <a href=\"https:\/\/sectigostore.com\/code-signing\/sectigo-code-signing-certificate\">trusted code signing certificate<\/a>.<\/li>\n\n\n\n<li><strong>Invest in an automated website security checker tool<\/strong>. Manually detecting and blocking web-based attacks in real time is virtually impossible to do manually, as there\u2019s too much noise and data to get through. <a href=\"https:\/\/sectigostore.com\/blog\/how-to-perform-a-website-security-check\/\">Website security checker tools<\/a> like <a href=\"https:\/\/sectigostore.com\/sitelock.aspx\">SiteLock<\/a> will <a href=\"https:\/\/www.youtube.com\/watch?v=Jj5WKG31XL4\">do the job <\/a><a href=\"https:\/\/www.youtube.com\/watch?v=Jj5WKG31XL4\">in a breeze<\/a>. <a href=\"https:\/\/sectigostore.com\/website-security\/hacker-guardian-pci-scan-control-center\">HackerGuardian<\/a> will even monitor your PCI DSS version 4 compliance, suggest fixes, and generate a ready-to-submit PCI DSS compliance report.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1004\" height=\"696\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/hackerguardian-pci-dss-scanner-dashboard-example.png\" alt=\"A screenshot of the HackerGuardian dashboard\" class=\"wp-image-3345\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/hackerguardian-pci-dss-scanner-dashboard-example.png 1004w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/hackerguardian-pci-dss-scanner-dashboard-example-300x208.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/hackerguardian-pci-dss-scanner-dashboard-example-560x388.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/hackerguardian-pci-dss-scanner-dashboard-example-940x652.png 940w\" sizes=\"auto, (max-width: 1004px) 100vw, 1004px\" \/><figcaption class=\"wp-element-caption\"><em>Image source: <a href=\"https:\/\/www.hackerguardian.com\/about-hackerguardian\">HackerGuardian.com<\/a>. Check your level of PCI DSS 4 compliance with HackerGuardian.<\/em><\/figcaption><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sectigostore.com\/website-security\/hackerguardian-pci-compliance-scanner\">Learn More About HackerGuardian<\/a><\/div>\n<\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Protect your scripts<\/strong>. <a href=\"https:\/\/sectigostore.com\/blog\/what-is-cross-site-scripting-how-to-prevent-cross-site-scripting-attacks\/\"><\/a>Implement <a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Cross_Site_Scripting_Prevention_Cheat_Sheet.html\">OWASP\u2019s recommendations<\/a> to shield your payment page from <a href=\"https:\/\/sectigostore.com\/blog\/what-is-cross-site-scripting-how-to-prevent-cross-site-scripting-attacks\/\">cross-site script<\/a> (XSS) attacks. Ensure 24\/7 automated XSS and other attack detection with <a href=\"https:\/\/sectigostore.com\/sitelock.aspx\">Sectigo SiteLock Website Security<\/a> scanner. From restricting unsafe scripts to content security policies, <a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Content_Security_Policy_Cheat_Sheet.html\">OWASP&#8217;s Content Security Policy<\/a> cheat sheet is a goldmine of tips and tricks.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">PCI DSS 4.0 \u2014 Requirement 7: Restrict Access to System Components and Cardholder Data by Business Need to Know<\/h3>\n\n\n\n<p>In February 2024, about <a href=\"https:\/\/www.paymentsdive.com\/news\/amex-cardholder-data-exposed-merchant-processor-hack\/709302\/\">1,300 American Express cardholders&#8217;<\/a><a href=\"https:\/\/www.paymentsdive.com\/news\/amex-cardholder-data-exposed-merchant-processor-hack\/709302\/\"><\/a> data were exposed due to unauthorized access to a third-party service provider&#8217;s system. Boost the security of your components and cardholder data to comply with these changes before the bell rings in March 2025.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Implement access control policies<\/strong>. <a href=\"https:\/\/owasp.org\/Top10\/A01_2021-Broken_Access_Control\/\">Broken access control<\/a> is the top threat listed in the <a href=\"https:\/\/owasp.org\/www-project-top-ten\/\">OWASP Top 10 Web Application Security Risks<\/a>. Don\u2019t be too generic. Your policies should cover all user roles, systems, and data they can access to. Short of ideas? Check out the <a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html\">OWASP Authorization <\/a>C<a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html\"><\/a><a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html\">heat <\/a>S<a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html\"><\/a><a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html\">heet<\/a>.<\/li>\n\n\n\n<li><strong>Follow the <\/strong><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/principle-of-least-privilege-POLP\"><strong>principle of the least privilege<\/strong><\/a><strong> (POLP)<\/strong>. \u201cYou shall not pass,\u201d declared Gandalf in <em>The Lord of the Rings<\/em>. Tell unauthorized third parties the same. Disable access to data by default. Grant access to only whom and what is required. For instance, an administrator doesn&#8217;t need to view cardholders&#8217; data to grant viewing access to them, right?<\/li>\n\n\n\n<li><strong>Delete what\u2019s not needed<\/strong>. Did a user change roles or departments? Did you stop dealing with a third party who had access to your systems? Don\u2019t wait \u2014 delete their accounts immediately to remove unnecessary access.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">PCI DSS 4.0 \u2014 Requirement 8: Identify Users and Authenticate Access to System Components<\/h3>\n\n\n\n<p>Over <a href=\"https:\/\/www.forbes.com\/advisor\/business\/software\/american-password-habits\/\">75% of U.S. users<\/a> surveyed by Forbes Advisor in 2024 admitted having their personally identifiable information (PII) stolen through hacked accounts. Yup. This section is all about securing accesses and passwords with different methods.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Implement <\/strong><a href=\"https:\/\/aws.amazon.com\/what-is\/mfa\/\"><strong>multifactor authentication<\/strong><\/a><strong> (MFA) wherever possible<\/strong>. Require users looking to access your <a href=\"https:\/\/www.pcisecuritystandards.org\/glossary\/cde\/\">cardholder data environment<\/a> (CDE), and other systems to provide two or more verification factors (e.g., a password and a one-time security code or a secure token).<\/li>\n\n\n\n<li><strong>Shield credentials from malicious snoopers<\/strong>. Protect applications and system passwords in transit from <a href=\"https:\/\/www.techtarget.com\/iotagenda\/definition\/man-in-the-middle-attack-MitM\">man-in-the-middle attacks<\/a> (MITM) with an <a href=\"https:\/\/sectigostore.com\/ssl-types\/ov-ssl-certificates\">SSL\/TLS certificate<\/a>. The <a href=\"https:\/\/sectigostore.com\/blog\/what-is-transport-layer-security-a-breakdown-of-the-tls-encryption-protocol\/\">encrypted connection<\/a> will scramble the transmitted data. Try to steal and\/or use those encrypted data now, hackers!<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"956\" height=\"541\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/ssl-tls-certificates-enabe-https-security.png\" alt=\"An illustration that shows how enabling the SSL\/TLS protocol (using an SSL\/TLS certificate) helps protect your data in transit \" class=\"wp-image-3346\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/ssl-tls-certificates-enabe-https-security.png 956w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/ssl-tls-certificates-enabe-https-security-300x170.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/ssl-tls-certificates-enabe-https-security-560x317.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/ssl-tls-certificates-enabe-https-security-940x532.png 940w\" sizes=\"auto, (max-width: 956px) 100vw, 956px\" \/><figcaption class=\"wp-element-caption\"><em>Image caption: The graphic shows how SSL\/TLS certificates shield cardholder\u2019s data in transit from MITM attacks and snooping.<\/em><\/figcaption><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Never hardcode passwords<\/strong>. According to GitGuardian\u2019s 2023 scan data, <a href=\"https:\/\/www.gitguardian.com\/state-of-secrets-sprawl-report-2024\">8 million GitHub commits<\/a> exposed at least one secret (e.g., credentials or keys). The takeaway? Don\u2019t <a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/798.html\">hardcode credentials<\/a>. Use secret <a href=\"https:\/\/soteri.io\/blog\/best-code-scanning-tools\">scanners<\/a> (GitHub offers <a href=\"https:\/\/blog.gitguardian.com\/announcing-has-my-secret-leaked\/\">a free one<\/a> too) to detect and delete them.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">PCI DSS 4.0 \u2014 Requirement 9: Restrict Physical Access to Cardholder Data<\/h3>\n\n\n\n<p>Did you know that point of sale (POS) terminals and <a href=\"https:\/\/www.pcisecuritystandards.org\/glossary\/poi\/\">points of interaction<\/a> (POI) are subject to <a href=\"https:\/\/www.securityweek.com\/vulnerabilities-expose-pax-payment-terminals-to-hacking\/\">vulnerabilities<\/a> as well and can be <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ncr-suffers-aloha-pos-outage-after-blackcat-ransomware-attack\/\"><\/a><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ncr-suffers-aloha-pos-outage-after-blackcat-ransomware-attack\/\">disabled via ransomware attacks<\/a><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ncr-suffers-aloha-pos-outage-after-blackcat-ransomware-attack\/\"><\/a><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ncr-suffers-aloha-pos-outage-after-blackcat-ransomware-attack\/\">,<\/a> too? No one and nothing is safe in the digital world. To protect your POI:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Set up regular inspections<\/strong>. Check your POI&#8217;s hardware and software. A checklist based on potential risks and new known vulnerabilities will ensure no stone will be left unturned.<\/li>\n\n\n\n<li><strong>Stay up to date with new threats<\/strong>. Subscribe to vulnerability catalog updates and cybersecurity newsletters. The NIST <a href=\"https:\/\/nvd.nist.gov\/\">National Vulnerability Database<\/a> (NVD) and <a href=\"https:\/\/cve.mitre.org\/\">MITRE\u2019s <\/a><a href=\"https:\/\/cve.mitre.org\/\">common vulnerabilities exposure (<\/a><a href=\"https:\/\/cve.mitre.org\/\">CVE<\/a>) database are two of the best sources you can refer to.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">PCI DSS 4.0 \u2014 Requirement 10: Log and Monitor All Access to System Components and Cardholder Data<\/h3>\n\n\n\n<p>We get it: effective log management and analysis is never easy. It gets even more complicated if your organization logs an average of <a href=\"https:\/\/klaviyo.tech\/logging-klaviyo-how-we-log-10-billion-events-a-day-c05902b8b538?gi=2961baa2f906\">9.5 billion<\/a> events a day, as Klaviyo does. However, logs are a vital component for security incident detection\/response and PCI DSS 4.0 compliance.<\/p>\n\n\n\n<p>Once again, OWASP comes to the rescue with some <a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html#implement-appropriate-logging\">log implementation best practices<\/a>. On top of it:&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automate log analysis and monitoring<\/strong>. There are a plethora of <a href=\"https:\/\/signoz.io\/comparisons\/log-analysis-tools\/\">paid and open-source log analysis tool<\/a><a href=\"https:\/\/signoz.io\/comparisons\/log-analysis-tools\/\">s<\/a> out there. Pick one or more. They\u2019ll help you detect and promptly address suspicious access to system components and cardholder data. Spotting critical security control issues won&#8217;t be a problem either.<\/li>\n\n\n\n<li><strong>Safeguard your logs<\/strong>. Access logs to system components and cardholder data contain sensitive information. Use <a href=\"https:\/\/www.thesslstore.com\/blog\/types-of-encryption-encryption-algorithms-how-to-choose-the-right-one\/\">strong encryption algorithms<\/a>. Apply strict <a href=\"https:\/\/doi.org\/10.6028\/NIST.SP.800-192\">access control policies<\/a> against unauthorized access, and tampering.<\/li>\n\n\n\n<li><strong>Review your logs often<\/strong>. Check your logs for anomalies or suspicious activities (e.g., too many failed logins in a short period of time, accesses from dodgy IP addresses or countries, etc.).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">PCI DSS 4.0 \u2014 Requirement 11: Test Security of Systems and Networks Regularly<\/h3>\n\n\n\n<p>In Q1 2024, Kaspersky reports that MITRE\u2019s <a href=\"https:\/\/www.cve.org\/\">CVE<\/a> Program registered <a href=\"https:\/\/securelist.com\/vulnerability-report-q1-2024\/112554\/\">3,965 vulnerabilities<\/a>. That\u2019s an average of 1,321 vulnerabilities per month in those first three months!<\/p>\n\n\n\n<p>Periodically testing systems and network security is the core of this section. It&#8217;ll guarantee that vulnerabilities and security issues are identified and addressed promptly and minimize the risk of leaks and fraudulent activities.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Scan systems with <\/strong><a href=\"https:\/\/sectigostore.com\/sitelock.aspx\"><strong>Sitelock<\/strong><\/a><strong> Pro or Business<\/strong>. Both tools will help you find system flaws before the bad guys do. They\u2019ll automatically check and patch your core applications, websites, <a href=\"https:\/\/www.techtarget.com\/searchcontentmanagement\/definition\/content-management-system-CMS\">content management systems<\/a> (CMSs), and more. And you\u2019ll get a warning email every time an issue is found.<\/li>\n\n\n\n<li><strong>Run thousands of diagnostic tests<\/strong>. Schedule your vulnerability tests with <a href=\"https:\/\/sectigostore.com\/website-security\/hacker-guardian-pci-scan-control-center\">HackerGuardian PCI Compliance tool<\/a><a href=\"https:\/\/sectigostore.com\/website-security\/hacker-guardian-pci-scan-control-center\"><\/a>. It can <a href=\"https:\/\/sectigostore.com\/website-security\/pci-scanning-enterprise-edition\"><\/a><a href=\"https:\/\/sectigostore.com\/website-security\/pci-scanning-enterprise-edition\">scan up to 20<\/a> servers (depending on the package chosen). You\u2019ll get a super detailed report based on over 30,000 diagnostic tests.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Hacker Guardian 2.0 | A Webinar from Sectigo\" width=\"940\" height=\"529\" src=\"https:\/\/www.youtube.com\/embed\/_6R94FUmhWs?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Set up alerts for critical unauthorized changes<\/strong>. Implement an alert system for payment pages&#8217; unauthorized modifications to <a href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Glossary\/HTTP_header\">HTTP headers<\/a> and content. Use the tools suggested above to scan your website for potential XSS. Don&#8217;t miss the <a href=\"https:\/\/owasp.org\/www-project-secure-headers\/\">OWASP secure headers project<\/a> page and the related <a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/HTTP_Headers_Cheat_Sheet.html\">cheat sheet<\/a> for additional tips.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">PCI DSS 4.0 \u2014 Requirement 12: Support Information Security with Organizational Policies and Programs<\/h3>\n\n\n\n<p>This last section highlights the importance of organizational policies and programs for effective card data protection. However, when employees are blissfully unaware of such procedures and standards, all sorts of security issues are right around the corner. Verizon\u2019s latest report proved it: <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">68% of data breaches<\/a> in 2023 involved human error (i.e., non-malicious human actions).&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Inform your peers and employees<\/strong>. Publish all security procedures, guidelines, and policies on your internal website to facilitate access to employees and stakeholders.<\/li>\n\n\n\n<li><strong>Set up ad hoc training sessions<\/strong>. Train your personnel with courses online or in-person sessions. Include a short final verification test to validate their acquired knowledge.<\/li>\n\n\n\n<li><strong>Review and keep all information and software up to date<\/strong>. Technology changes fast and so do attackers\u2019 strategies and approaches. Harness the power of checklists to review the security of all your hardware, software, and protocols. Last but not least, always choose the latest <a href=\"https:\/\/sectigostore.com\/blog\/what-is-an-ssl-tls-cipher-suite\/\">cryptographic cipher suites<\/a>. They are the most secure.<\/li>\n<\/ul>\n\n\n\n<p>This is it. A neat overview of PCI DSS 4.0\u2019s changes coming into effect by Q2 2025. Don&#8217;t stop reading. There&#8217;s more to know before kicking off your compliance activities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">PCI DSS 4.0: Which Requirements Apply to My Organization?<\/h2>\n\n\n\n<p>All companies handling payment data or accepting credit, debit, or digital card payments must be PCI DSS 4.0 compliant. However, not all businesses are created equal. For instance, service providers have 10 supplementary requirements to satisfy by March 31, 2025 before reaching compliance. (There are 11 service provider-related new requirements total in PCI DSS version 4.0, but one was effective immediately.) <\/p>\n\n\n\n<p>This means that mom-and-pop shops won&#8217;t have to meet the same standards required of big corporations and enterprises.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"913\" height=\"455\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-40-service-provider-only-example.png\" alt=\"A screenshot of one of the service provider-specific requirements from the PCI DSS version 3.2.1 to version 4.0 transition document\" class=\"wp-image-3347\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-40-service-provider-only-example.png 913w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-40-service-provider-only-example-300x150.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-40-service-provider-only-example-560x279.png 560w\" sizes=\"auto, (max-width: 913px) 100vw, 913px\" \/><figcaption class=\"wp-element-caption\"><em>Image source: <a href=\"https:\/\/docs-prv.pcisecuritystandards.org\/PCI%20DSS\/Standard\/PCI-DSS-v3-2-1-to-v4-0-Summary-of-Changes-r2.pdf\">PCI DSS version 4 summary of changes<\/a>. The screenshot shows an example of a new requirement for service providers only.<\/em><\/figcaption><\/figure>\n\n\n\n<p>To this effect, the PCI Security Standards Council created four different compliance levels based on credit card transaction volume. Each level requires the implementation of a specific set of security control rules.<\/p>\n\n\n\n<p>Before plunging into the PCI DSS 4.0 list, check out our <a href=\"https:\/\/sectigostore.com\/blog\/pci-merchant-compliance-levels\/\">merchant compliance comprehensive guide<\/a> and do a first <a href=\"https:\/\/sectigostore.com\/blog\/how-to-do-a-pci-self-assessment\/\">PCI self-assessment<\/a>. You&#8217;ll immediately find out which level your organization fits into and its requirements.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"943\" height=\"558\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-version-4-merchant-compliance-levels.png\" alt=\"A graphc showing the four PCI DSS Merchant Complaince Levels\" class=\"wp-image-3348\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-version-4-merchant-compliance-levels.png 943w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-version-4-merchant-compliance-levels-300x178.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-version-4-merchant-compliance-levels-560x331.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-version-4-merchant-compliance-levels-940x556.png 940w\" sizes=\"auto, (max-width: 943px) 100vw, 943px\" \/><figcaption class=\"wp-element-caption\"><em>Image caption: The graphic shows a high-level overview of the PCI DSS 4.0 merchant compliance levels.<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Why SSL Certificates and Code Signing Are Important for PCI Compliance?<\/h2>\n\n\n\n<p>Every time a customer makes a payment online, their credit\/debit card or banking information is at risk of falling into the wrong hands. Phishing is another dangerous threat plaguing businesses accepting payments online. In 2023, Zscaler identified 745 million more attacks than in 2022, marking a <a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/phishing-attacks-rise-58-year-ai-threatlabz-2024-phishing-report\">58% increase<\/a> year over year.<\/p>\n\n\n\n<p>And before you say it, nope, this likely isn&#8217;t only due to some scanning tool improvements. Other software security providers noticed the same trend. Bolster, for example, recorded a <a href=\"https:\/\/bolster.ai\/blog\/2024-state-of-phishing-statistics-online-scams\">94% <\/a><a href=\"https:\/\/bolster.ai\/blog\/2024-state-of-phishing-statistics-online-scams\">growth<\/a> in phishing attacks since 2020.&nbsp;<\/p>\n\n\n\n<p>So, an <a href=\"https:\/\/sectigostore.com\/ssl-types\/ev-ssl-certificates\">SSL\/TLS certificate<\/a> issued by a <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-certificate-authority-certification-authorities-explained\/\">trusted certificate authority<\/a> (CA) will:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Protect your websites from MITM attacks<\/strong>. The certificate uses a <a href=\"https:\/\/www.thesslstore.com\/blog\/what-is-256-bit-encryption\/\">256-bit encryption key<\/a> to scramble the information in transit between the client and the server, making it virtually impossible for an attacker to decrypt it.<\/li>\n\n\n\n<li><strong>Shield you from phishing attempts<\/strong>. On websites protected by <a href=\"https:\/\/sectigostore.com\/ssl-certificates\/sectigo-ov-multi-domain-ssl\">SSL\/TLS certificates<\/a>, users can confirm the legitimacy of the site by verifying the website\u2019s owner identity (so long as the site owner opted for an organization- or extended-validation certificate). The URL will also start with \u201cHTTPS\u201d (<a href=\"https:\/\/sectigostore.com\/blog\/port-443-everything-you-need-to-know-about-https-443\/\">hypertext transfer protocol secure<\/a>) to further reassure the user about the security of the page, showing the connection is encrypted.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"935\" height=\"510\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/https-example-sectigostore-dot-com.png\" alt=\"A screenshot from SectigoStore.com that shows the website is secured using an SSL\/TLS certificate\" class=\"wp-image-3349\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/https-example-sectigostore-dot-com.png 935w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/https-example-sectigostore-dot-com-300x164.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/https-example-sectigostore-dot-com-560x305.png 560w\" sizes=\"auto, (max-width: 935px) 100vw, 935px\" \/><figcaption class=\"wp-element-caption\">Image source: <a href=\"https:\/\/sectigostore.com\/blog\/\">SectigoStore.com blog<\/a>. The screenshot shows how to spot a website secured by a trusted SSL\/TLS certificate.<\/figcaption><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Help you achieve PCD DSS 4 and 4.0.1 compliance<\/strong>. <a href=\"https:\/\/sectigostore.com\/ssl-certificates\/positivessl-ev\">SSL\/TLS certificates<\/a> are the backbone of PCI DSS compliance. They offer strong private keys and the latest cipher suites. Likewise, it guarantees that cardholders&#8217; data are stored and transmitted securely. Without it, compliance isn\u2019t possible.<\/li>\n<\/ul>\n\n\n\n<p>Last but not least, <a href=\"https:\/\/sectigostore.com\/code-signing\">trusted <\/a><a href=\"https:\/\/sectigostore.com\/code-signing\">code signing <\/a><a href=\"https:\/\/sectigostore.com\/code-signing\">certificates<\/a> will also, even if indirectly, help you reach PCI DSS 4.0 compliance. Add another layer of security against attacks by installing only signed plug-ins and components, and by signing SBOMs for software you create. And if you develop your own software or plug-ins, even just for internal use, code signing with a publicly trusted digital certificate is something you can\u2019t do without. It can help you meet <a href=\"https:\/\/docs-prv.pcisecuritystandards.org\/Software%20Security\/Standard\/PCI-Secure-Software-Standard-v1_2.pdf\">PCI SSC\u2019s Software Standards<\/a>\u2019 security requirements.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts About What You Need to Know About PCI DSS 4.0<\/h2>\n\n\n\n<p>Preparing for PCI DSS version 4.0&#8217;s March 2025 deadline will take organizations time and work. However, understanding the changes is the first step to reaching compliance. The good news is that the things we&#8217;ve listed here today are things that every security-conscious organization should already be doing.<\/p>\n\n\n\n<p>Put to good use what you\u2019ve just learned. Start addressing the latest PCI DSS 4 requirements today by following the tips included in this article.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use <a href=\"https:\/\/sectigostore.com\/ssl-certificates\/enterprise-ssl-pro-ev\">SSL\/TLS certificates<\/a> to secure your sites and web apps to keep connections private and protect cardholder data during transmission over the network.<\/li>\n\n\n\n<li>Create, maintain, and digitally sign an SBOM as an inventory of your software.<\/li>\n\n\n\n<li>Invest in a malware and PCI-DSS compliance scan tool like <a href=\"https:\/\/sectigostore.com\/website-security\/pci-scanning-enterprise-edition\">HackerGuardian<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>It&#8217;ll protect your organization and customers&#8217; sensitive data, make your reputation shine, increase customers&#8217; trust, and, in case of a data breach, it&#8217;ll help you minimize losses and avoid fines.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is your organization ready to comply with the PCI DSS 4.0 requirements that will become effective in March 2025? Here&#8217;s what you need to know to integrate PCI DSS 4.0&#8230;<\/p>\n","protected":false},"author":23,"featured_media":3353,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","tve_updated_post":"<div class=\"thrv_wrapper tve_wp_shortcode\"><div class=\"tve_shortcode_raw\" style=\"display: none\">___TVE_SHORTCODE_RAW__&lt;p&gt;&lt;!-- wp:heading --&gt;&lt;\/p&gt;\n&lt;h2 class=\"wp-block-heading\"&gt;Is your organization ready to comply with the PCI DSS 4.0 requirements that will become effective in March 2025? Here's what you need to know to integrate PCI DSS 4.0 (and revisions outlined in version 4.0.1) into your security framework and operation&lt;\/h2&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;The &lt;a href=\"https:\/\/sectigostore.com\/blog\/what-is-pci-dss-a-quick-guide-to-the-12-pci-dss-requirements\/\"&gt;Payment Card Industry Data Security Standards&lt;\/a&gt; (PCI DSS) is a set of security fundamentals that helps organizations handling payment card information avoid falling prey to cybersecurity incidents and data breaches. It also ensures they pay the consequences when they do. In 2022, the &lt;a href=\"https:\/\/www.pcisecuritystandards.org\/\" target=\"_blank\" rel=\"noopener\"&gt;Payment Card Industry Security Standards Council &lt;\/a&gt;(PCI SSC) published &lt;a href=\"https:\/\/docs-prv.pcisecuritystandards.org\/PCI%20DSS\/Standard\/PCI-DSS-v4_0.pdf\"&gt;PCI DSS version 4.0\u2019&lt;\/a&gt;s &lt;a href=\"https:\/\/blog.pcisecuritystandards.org\/pci-dss-v3-2-1-is-retiring-on-31-march-2024-are-you-ready\"&gt;first set of revised and new requirements&lt;\/a&gt;.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Many of these standards requirements became effective on March 31, 2024 (with additional \u201cbest practices\u201d that will be mandatory by March 31, 2025). However, in June 2024, they published PCI DSS version 4.0.1, which revises specific requirements to provide clarification and guidance but provides \u201cno additional or deleted requirements\u201d to PCI DSS version 4.0. So, don\u2019t panic.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Now, it's time to start preparing for the next PCI DSS 4.0 requirements that\u2019ll kick into effect next year and ensure you\u2019re also taking into account the clarifying revisions published in version 4.0.1.&nbsp;&nbsp;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:heading --&gt;&lt;\/p&gt;\n&lt;h2 class=\"wp-block-heading\"&gt;PCI DSS 4.0 Phase Two: Dozens of New Requirements to Be Implemented Before Q2 2025&lt;\/h2&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:image {\"id\":3342,\"sizeSlug\":\"large\",\"linkDestination\":\"none\"} --&gt;&lt;\/p&gt;\n&lt;figure class=\"wp-block-image size-large\"&gt;&lt;img class=\"wp-image-3342\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-4-and-401-timeline-1024x512.png\" alt=\"A timeline showcasing how PCI DSS version 4.0 and amendments in version 4.0.1 roll out in 2024 and 2025 \" \/&gt;\n&lt;figcaption class=\"wp-element-caption\"&gt;&lt;em&gt;Image caption: &lt;\/em&gt;&lt;em&gt;&nbsp;The graphic shows the deadline for implementing the remaining PCD DSS 4.0 requirements (and when PCI DSS 4.0 will be replaced by v4.0.1).&lt;\/em&gt;&lt;\/figcaption&gt;\n&lt;\/figure&gt;\n&lt;p&gt;&lt;!-- \/wp:image --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;PCI DSS 4 introduced several &lt;a href=\"https:\/\/docs-prv.pcisecuritystandards.org\/PCI%20DSS\/Standard\/PCI-DSS-v3-2-1-to-v4-0-Summary-of-Changes-r2.pdf\"&gt;fundamental changes&lt;\/a&gt; to tackle emerging threats and security issues brought about by new technological advancements since the 2018 release of the previous version, PCI DSS 3.2.1.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;PCI DSS version 4.0 includes in total 64 new requirements. With the first phase of 13 new requirements done and dusted, the next stage includes rolling out the remaining 51 new PCI DSS 4.0 requirements. Currently considered \"best practices,\" they\u2019ll come into force no later than March 31, 2025. (NOTE: Not all requirements may apply to you, as some are specific to service providers.)&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;We get it, that's a lot to digest. To help you, we've prepared an overview of these second-phase requirements and a few tips. It'll enable you to better understand the new rules and how best to address them.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Check the summary table and\/or go into the nitty-gritty sections below. (NOTE: We skipped listing the new requirements under Principal Requirements #1 and #2 since they went into effect when PCI DSS 4.0 rolled out).&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:table --&gt;&lt;\/p&gt;\n&lt;figure class=\"wp-block-table\"&gt;\n&lt;table&gt;\n&lt;tbody&gt;\n&lt;tr&gt;\n&lt;td&gt;&lt;strong&gt;Changed PCI DSS Version 4.0 Requirements That Are \u201cBest Practices\u201d Until March 31, 2025&lt;\/strong&gt;&lt;\/td&gt;\n&lt;td&gt;&lt;strong&gt;PCI DSS 4 \u2014 Summary of Changes (New or Amended Requirements)&lt;\/strong&gt;&lt;\/td&gt;\n&lt;td&gt;&lt;strong&gt;Tips to Help You Comply with Some of These New Requirements&lt;\/strong&gt;&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;\n&lt;td&gt;Requirement 3: Protect Stored Account Data&lt;\/td&gt;\n&lt;td&gt;These changes are related to the protection of &lt;a href=\"https:\/\/www.pcisecuritystandards.org\/glossary\/sensitive-authentication-data\/\"&gt;sensitive authentication data&lt;\/a&gt; (SAD) and &lt;a href=\"https:\/\/www.pcisecuritystandards.org\/glossary\/pan\/\"&gt;primary account numbers&lt;\/a&gt; (PANs) through encryption and cryptographic hashes.&lt;\/td&gt;\n&lt;td&gt;Use strong &lt;a href=\"https:\/\/www.thesslstore.com\/blog\/what-is-a-hash-function-in-cryptography-a-beginners-guide\/\"&gt;cryptographic hash functions&lt;\/a&gt; and algorithms.Limit the usage of disk-level encryption.Ensure secure cryptographic key storage &nbsp;&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;\n&lt;td&gt;Requirement 4: Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public Networks&lt;\/td&gt;\n&lt;td&gt;These new and amended requirements focus on cryptography-related roles and responsibilities, and certificate and key validity and inventory.&lt;\/td&gt;\n&lt;td&gt;Use certificate management software such as &lt;a href=\"https:\/\/sectigostore.com\/enterprise\/sectigo-certificate-manager\"&gt;Sectigo Certificate Manager&lt;\/a&gt; or &lt;a href=\"https:\/\/www.digicert.com\/tls-ssl\/certcentral-tls-ssl-manager\"&gt;D&lt;\/a&gt;&lt;a href=\"https:\/\/www.digicert.com\/tls-ssl\/certcentral-tls-ssl-manager\"&gt;igi&lt;\/a&gt;&lt;a href=\"https:\/\/www.digicert.com\/tls-ssl\/certcentral-tls-ssl-manager\"&gt;Cert &lt;\/a&gt;&lt;a href=\"https:\/\/www.digicert.com\/tls-ssl\/certcentral-tls-ssl-manager\"&gt;CertCentral&lt;\/a&gt; to verify the validity of your SSL\/TLS certificates.The same tools will help you keep an inventory of keys and certificates.&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;\n&lt;td&gt;Requirement 5: Protect All Systems and Networks from Malicious Software&lt;\/td&gt;\n&lt;td&gt;These new clauses emphasize the implementation of regular malware scanning and &lt;a href=\"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/\"&gt;phishing&lt;\/a&gt; protection.&lt;\/td&gt;\n&lt;td&gt;Review your components and implement &lt;a href=\"https:\/\/codesigningstore.com\/how-to-harden-your-software-supply-chain-security\"&gt;supply chain security best practices&lt;\/a&gt;.Run daily malware scans using only trusted and well-known anti-virus\/malware tools such as &lt;a href=\"https:\/\/sectigostore.com\/sitelock.aspx\"&gt;SiteLock&lt;\/a&gt;.Train your users to recognize and avoid phishing scams and malware threats.&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;\n&lt;td&gt;Requirement 6: Develop and Maintain Secure Systems and Software&lt;\/td&gt;\n&lt;td&gt;New requirements focusing on software security and system threat prevention through automation and secure practices.&lt;\/td&gt;\n&lt;td&gt;Create an &lt;a href=\"https:\/\/www.thesslstore.com\/blog\/sbom-an-up-close-look-at-a-software-bill-of-materials\/\"&gt;S&lt;\/a&gt;&lt;a href=\"https:\/\/www.thesslstore.com\/blog\/sbom-an-up-close-look-at-a-software-bill-of-materials\/\"&gt;BOM&lt;\/a&gt; to list all application\u2019s open source components, their licenses, versions, and patch status. Sign it with a &lt;a href=\"https:\/\/sectigostore.com\/code-signing\/sectigo-code-signing-certificate\"&gt;trusted code signing certificate&lt;\/a&gt;.Invest in &lt;a href=\"https:\/\/sectigostore.com\/blog\/how-to-perform-a-website-security-check\/\"&gt;Website security checker tools&lt;\/a&gt; like &lt;a href=\"https:\/\/sectigostore.com\/sitelock.aspx\"&gt;SiteLock&lt;\/a&gt;. &lt;a href=\"https:\/\/sectigostore.com\/website-security\/hacker-guardian-pci-scan-control-center\"&gt;HackerGuardian&lt;\/a&gt; will even monitor your PCI DSS version 4 compliance.Shield your payment page scripts from &lt;a href=\"https:\/\/sectigostore.com\/blog\/what-is-cross-site-scripting-how-to-prevent-cross-site-scripting-attacks\/\"&gt;cross-site script&lt;\/a&gt; (XSS) attacks following &lt;a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Cross_Site_Scripting_Prevention_Cheat_Sheet.html\"&gt;OWASP\u2019s suggestions&lt;\/a&gt;.&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;\n&lt;td&gt;Requirement 7: Restrict Access to System Components and Cardholder Data by Business Need to Know&lt;\/td&gt;\n&lt;td&gt;These new requirements address regulated access to systems and cardholder data.&lt;\/td&gt;\n&lt;td&gt;Implement access control policies as described in the &lt;a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html\"&gt;OWASP&lt;\/a&gt;&lt;a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html\"&gt; Authorization cheat sheet&lt;\/a&gt;.Follow the &lt;a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/principle-of-least-privilege-POLP\"&gt;principle of the least privilege&lt;\/a&gt; (POLP).Delete unused accounts.&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;\n&lt;td&gt;Requirement 8: Identify Users and Authenticate Access to System Components &nbsp;&lt;\/td&gt;\n&lt;td&gt;These changes mandate additional measures to secure access and passwords.&lt;\/td&gt;\n&lt;td&gt;Implement &lt;a href=\"https:\/\/aws.amazon.com\/what-is\/mfa\/\"&gt;multifactor authentication&lt;\/a&gt; (MFA) wherever possible.Shield credentials from malicious snoopers and &lt;a href=\"https:\/\/www.techtarget.com\/iotagenda\/definition\/man-in-the-middle-attack-MitM\"&gt;man-in-the-middle attacks&lt;\/a&gt; (MITM) with an &lt;a href=\"https:\/\/sectigostore.com\/ssl-types\/ov-ssl-certificates\"&gt;SSL\/TLS certificate&lt;\/a&gt;.Never hardcode passwords.&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;\n&lt;td&gt;Requirement 9: Restrict Physical Access to Cardholder Data&lt;\/td&gt;\n&lt;td&gt;This single point highlights the importance of securing all physical &lt;a href=\"https:\/\/www.pcisecuritystandards.org\/glossary\/poi\/\"&gt;points of interaction&lt;\/a&gt; (POI and access to cardholder data).&lt;\/td&gt;\n&lt;td&gt;Inspect them regularly.Stay up to date with new threats. Check the NIST &lt;a href=\"https:\/\/nvd.nist.gov\/\"&gt;National Vulnerability Database&lt;\/a&gt; (NVD) and &lt;a href=\"https:\/\/cve.mitre.org\/\"&gt;MITRE\u2019s &lt;\/a&gt;&lt;a href=\"https:\/\/cve.mitre.org\/\"&gt;common vulnerabilities exposure (&lt;\/a&gt;&lt;a href=\"https:\/\/cve.mitre.org\/\"&gt;CVE&lt;\/a&gt;) database.&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;\n&lt;td&gt;Requirement 10: Log and Monitor All Access to System Components and Cardholder Data&lt;\/td&gt;\n&lt;td&gt;These requirements encompass the actions that are required for effective log management and analysis.&lt;\/td&gt;\n&lt;td&gt;Don\u2019t miss OWASP &lt;a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html#implement-appropriate-logging\"&gt;log implementation best practices&lt;\/a&gt;.&nbsp;&nbsp;&nbsp;&nbsp; Automate log analysis and monitoring with the support of &lt;a href=\"https:\/\/signoz.io\/comparisons\/log-analysis-tools\/\"&gt;paid &lt;\/a&gt;&lt;a href=\"https:\/\/signoz.io\/comparisons\/log-analysis-tools\/\"&gt;or&lt;\/a&gt;&lt;a href=\"https:\/\/signoz.io\/comparisons\/log-analysis-tools\/\"&gt; open-source log analysis tool&lt;\/a&gt;&lt;a href=\"https:\/\/signoz.io\/comparisons\/log-analysis-tools\/\"&gt;s&lt;\/a&gt;.Encrypt your log using &lt;a href=\"https:\/\/www.thesslstore.com\/blog\/types-of-encryption-encryption-algorithms-how-to-choose-the-right-one\/\"&gt;strong encryption algorithms&lt;\/a&gt;, apply strict &lt;a href=\"https:\/\/doi.org\/10.6028\/NIST.SP.800-192\"&gt;access contro&lt;\/a&gt;&lt;a href=\"https:\/\/doi.org\/10.6028\/NIST.SP.800-192\"&gt;l policies&lt;\/a&gt;, and review them often.&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;\n&lt;td&gt;Requirement 11: Test Security of Systems and Networks Regularly&lt;\/td&gt;\n&lt;td&gt;The newly added clauses emphasize the need for testing systems and networks to fix all vulnerabilities found and protect payment pages from unauthorized modifications.&lt;\/td&gt;\n&lt;td&gt;Scan systems with &lt;a href=\"https:\/\/sectigostore.com\/sitelock.aspx\"&gt;SiteLock&lt;\/a&gt; Pro and Business.Schedule and run over 30,000 vulnerabilities and XSS attack tests with &lt;a href=\"https:\/\/sectigostore.com\/website-security\/hacker-guardian-pci-scan-control-center\"&gt;HackerGuardian&lt;\/a&gt;.Implement an alert system for HTTP headers of payment pages and content's unauthorized modifications.&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;\n&lt;td&gt;Requirement 12: Support Information Security with Organizational Policies and Programs&lt;\/td&gt;\n&lt;td&gt;All changes related to this requirement are centered on security policies and programs, including those involving third-party service providers (TPSPs).&lt;\/td&gt;\n&lt;td&gt;Inform your peers and employees.Set up ad hoc training sessions.Review and keep all information up to date.&nbsp;&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;\/tbody&gt;\n&lt;\/table&gt;\n&lt;\/figure&gt;\n&lt;p&gt;&lt;!-- \/wp:table --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:heading {\"level\":3} --&gt;&lt;\/p&gt;\n&lt;h3 class=\"wp-block-heading\"&gt;PCI DSS 4.0 \u2014 Requirement 3: Protect Stored Account Data&lt;\/h3&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;According to BlackFog\u2019s latest report, &lt;a href=\"https:\/\/www.blackfog.com\/the-state-of-ransomware-2024\/\"&gt;92% of ransomware attacks&lt;\/a&gt; analyzed in the first four months of 2024 were used to extract data. This PCI DSS version 4 section includes new requirements related to the protection of sensitive &lt;a href=\"https:\/\/www.imperva.com\/learn\/data-security\/data-at-rest\/\"&gt;data at rest&lt;\/a&gt; (i.e., saved in a digital form). They all align perfectly with BlackFog's findings.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Specifically, these changes mandate enterprises to protect &lt;a href=\"https:\/\/www.pcisecuritystandards.org\/glossary\/sensitive-authentication-data\/\"&gt;sensitive authentication data&lt;\/a&gt; (SAD) and &lt;a href=\"https:\/\/www.pcisecuritystandards.org\/glossary\/pan\/\"&gt;primary account numbers&lt;\/a&gt; (PANs) through &lt;a href=\"https:\/\/sectigostore.com\/blog\/what-is-encryption-and-how-does-it-work\/\"&gt;encryption&lt;\/a&gt; and &lt;a href=\"https:\/\/sectigostore.com\/blog\/hash-function-in-cryptography-how-does-it-work\/\"&gt;cryptographic hashes&lt;\/a&gt;.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;To achieve compliance, you may want to:&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Use strong mathematical encryption algorithms&lt;\/strong&gt;. Follow &lt;a href=\"https:\/\/csrc.nist.gov\/pubs\/fips\/180-4\/upd1\/final\"&gt;industry standards&lt;\/a&gt;. For instance, use the secure algorithm &lt;a href=\"https:\/\/codesigningstore.com\/what-is-the-most-secure-hashing-algorithm\"&gt;SHA-256&lt;\/a&gt; to make PANs and SAD unreadable, and use robust asymmetric algorithms, too. Moreover, get ready for quantum computing by adopting hybrid &lt;a href=\"https:\/\/www.nist.gov\/news-events\/news\/2023\/08\/nist-standardize-encryption-algorithms-can-resist-attack-quantum-computers\"&gt;post quantum cryptography (PQC) algorithms&lt;\/a&gt;.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Opt for keyed cryptographic hashes&lt;\/strong&gt;. In other words, use the &lt;a href=\"https:\/\/www.okta.com\/identity-101\/hmac\/\"&gt;hash message authentication code&lt;\/a&gt; (HMAC) with two cryptographic keys (computed from one key) to preserve data authenticity and integrity.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Limit the usage of disk-level encryption&lt;\/strong&gt;. Encrypt PAN data only at the disk or partition levels. This way, the data will be indecipherable when stored on removable hardware.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:heading {\"level\":3} --&gt;&lt;\/p&gt;\n&lt;h3 class=\"wp-block-heading\"&gt;PCI DSS 4.0 \u2014 Requirement 4: Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public Networks&lt;\/h3&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Is your website part of &lt;a href=\"https:\/\/transparencyreport.google.com\/https\/overview?hl=en\"&gt;96% of &lt;\/a&gt;&lt;a href=\"https:\/\/transparencyreport.google.com\/https\/overview?hl=en\"&gt;internet Google traffic&lt;\/a&gt; protected by a &lt;a href=\"https:\/\/sectigostore.com\/ssl-certificates\"&gt;secure socket layer\/transport layer security&lt;\/a&gt; (SSL\/TLS) certificate? We bet it is. Unfortunately, that isn't enough to prevent the bad guys from snooping\/stealing sensitive data transmitted over the network.&nbsp;&nbsp;&nbsp;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Protect your organization and customers from &lt;a href=\"https:\/\/www.rapid7.com\/fundamentals\/man-in-the-middle-attacks\/\"&gt;man-in-the-middle attacks&lt;\/a&gt; (MITM).&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Check that your SSL\/TLS certificates are still valid&lt;\/strong&gt;. Certificates don't last forever. Use certificate management software such as &lt;a href=\"https:\/\/sectigostore.com\/enterprise\/sectigo-certificate-manager\"&gt;Sectigo Certificate Manager&lt;\/a&gt; to keep expired or revoked certificates under control. It'll be particularly helpful now that Google &lt;a href=\"https:\/\/www.sectigo.com\/resource-library\/google-announces-intentions-to-limit-tls-certificates-to-90-days-why-automated-clm-is-crucial\"&gt;has &lt;\/a&gt;&lt;a href=\"https:\/\/www.sectigo.com\/resource-library\/google-announces-intentions-to-limit-tls-certificates-to-90-days-why-automated-clm-is-crucial\"&gt;announced&lt;\/a&gt; that it might require SSL certificates with a mandatory 90-day validity period.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Keep an inventory of keys and certificates&lt;\/strong&gt;. The same tools we\u2019ve just mentioned will give you a complete and up-to-date picture of all your secrets and &lt;a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-private-key-in-cybersecurity\/\"&gt;keys&lt;\/a&gt;.&nbsp;&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:image {\"id\":3343,\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --&gt;&lt;\/p&gt;\n&lt;figure class=\"wp-block-image size-full\"&gt;&lt;img class=\"wp-image-3343\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/sectigo-certificate-manager-overview.png\" alt=\"An overview of some of the features and benefits of using Sectigo Certificate Manager\" \/&gt;\n&lt;figcaption class=\"wp-element-caption\"&gt;&lt;em&gt;Image source: &lt;a href=\"https:\/\/sectigostore.com\/enterprise\/sectigo-certificate-manager\"&gt;SectigoStore.com&lt;\/a&gt;. Take the burden off your staff with Sectigo Certificate Manager. This end-to-end certificate lifecycle management platform will ensure you'll never use expired certificates again.&lt;\/em&gt;&lt;\/figcaption&gt;\n&lt;\/figure&gt;\n&lt;p&gt;&lt;!-- \/wp:image --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:buttons --&gt;&lt;\/p&gt;\n&lt;div class=\"wp-block-buttons\"&gt;&lt;!-- wp:button --&gt;\n&lt;div class=\"wp-block-button\"&gt;&lt;a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sectigostore.com\/enterprise\/sectigo-certificate-manager\"&gt;Get Sectigo Certificate Manager&lt;\/a&gt;&lt;\/div&gt;\n&lt;p&gt;&lt;!-- \/wp:button --&gt;&lt;\/p&gt;\n&lt;\/div&gt;\n&lt;p&gt;&lt;!-- \/wp:buttons --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:heading {\"level\":3} --&gt;&lt;\/p&gt;\n&lt;h3 class=\"wp-block-heading\"&gt;PCI DSS 4.0 \u2014 Requirement 5: Protect All Systems and Networks from Malicious Software&lt;\/h3&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;In 2023, the total malware volume identified by SonicWall increased &lt;a href=\"https:\/\/www.sophos.com\/en-us\/content\/state-of-ransomware\"&gt;globally by 11%&lt;\/a&gt;. Zscaler discovered &lt;a href=\"https:\/\/www.zscaler.com\/campaign\/threatlabz-phishing-report\"&gt;745 million&lt;\/a&gt; more attacks than in 2022. The new clauses included in this group focus on &lt;a href=\"https:\/\/sectigostore.com\/blog\/malware-attack-different-types-of-malware-attacks\/\"&gt;malware&lt;\/a&gt; prevention through periodical components evaluation, regular malware scanning, and &lt;a href=\"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/\"&gt;phishing&lt;\/a&gt; protection.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Harden the security of your supply chain&lt;\/strong&gt;. ReversingLabs detected a &lt;a href=\"https:\/\/www.reversinglabs.com\/sscs-report\"&gt;1,300% increase in malicious components&lt;\/a&gt; in just three years (2020-23). Periodically review your components' security and implement &lt;a href=\"https:\/\/codesigningstore.com\/how-to-harden-your-software-supply-chain-security\"&gt;supply chain security&lt;\/a&gt; best practices.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Scan your software for malware&lt;\/strong&gt;. Run daily malware scans using only trusted antivirus\/antimalware tools such as &lt;a href=\"https:\/\/sectigostore.com\/sitelock.aspx\"&gt;SiteLock&lt;\/a&gt;. Use more than one for comprehensive detection. Don\u2019t rely on free scanners as they may be out of date.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:embed {\"url\":\"https:\/\/www.youtube.com\/watch?v=AGvdZjcHRao\",\"type\":\"video\",\"providerNameSlug\":\"youtube\",\"responsive\":true,\"className\":\"wp-embed-aspect-16-9 wp-has-aspect-ratio\"} --&gt;&lt;\/p&gt;\n&lt;figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"&gt;\n&lt;div class=\"wp-block-embed__wrapper\"&gt;https:\/\/www.youtube.com\/watch?v=AGvdZjcHRao&lt;\/div&gt;\n&lt;\/figure&gt;\n&lt;p&gt;&lt;!-- \/wp:embed --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Train your users&lt;\/strong&gt;. &lt;a href=\"https:\/\/www.techrepublic.com\/article\/evilproxy-phishing-attack\/\"&gt;EvilProxy&lt;\/a&gt; (a phishing attack that managed to bypass multifactor authentication [MFA]) and &lt;a href=\"https:\/\/www.proofpoint.com\/us\/blog\/email-and-cloud-threats\/cybersecurity-stop-month-qr-code-phishing\"&gt;QR code phishing&lt;\/a&gt; are just two examples of the potential consequences of untrained users. Turn click-enthusiast users into cybersecurity guards. &lt;a href=\"https:\/\/www.cisa.gov\/secure-our-world\/teach-employees-avoid-phishing\"&gt;Teach &lt;\/a&gt;&lt;a href=\"https:\/\/www.cisa.gov\/secure-our-world\/teach-employees-avoid-phishing\"&gt;them&lt;\/a&gt; about &lt;a href=\"https:\/\/sectigostore.com\/blog\/common-types-of-phishing-attacks-how-to-recognize-avoid-them\/\"&gt;phishing&lt;\/a&gt; and show them how to recognize &lt;a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\"&gt;phishing emails&lt;\/a&gt; and attacks.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:heading {\"level\":3} --&gt;&lt;\/p&gt;\n&lt;h3 class=\"wp-block-heading\"&gt;PCI DSS 4.0 \u2014 Requirement 6: Develop and Maintain Secure Systems and Software&lt;\/h3&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;a href=\"https:\/\/www.secureblink.com\/cyber-security-news\/2-8-m-records-stolen-in-sav-rx-data-breach-what-you-need-to-know\"&gt;2.8 million&lt;\/a&gt; personal data of Sav-Rx clients, a pharmacy benefit management company, were stolen in October 2023. A lack of advanced threat detection and monitoring procedures was among the identified vulnerabilities. This confirms the need to focus on threat prevention through automation. Precisely what this section's updates are about. Here are our suggestions to help you reach compliance:&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Create and request software bills of materials (SBOMs)&lt;\/strong&gt;. SBOMS are gaining popularity, being supported by &lt;a href=\"https:\/\/www.sonatype.com\/state-of-the-software-supply-chain\/software-supply-chain-maturity\"&gt;75% of cybersecurity leaders&lt;\/a&gt; in 2023. These detailed breakdowns of software components were included in the U.S. White House\u2018s&nbsp; &lt;a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\"&gt;Executive Order (EO) 14028&lt;\/a&gt;. Each &lt;a href=\"https:\/\/www.thesslstore.com\/blog\/sbom-an-up-close-look-at-a-software-bill-of-materials\/\"&gt;S&lt;\/a&gt;&lt;a href=\"https:\/\/www.thesslstore.com\/blog\/sbom-an-up-close-look-at-a-software-bill-of-materials\/\"&gt;BOM&lt;\/a&gt; lists all an application\u2019s open source components, licenses, versions, and patch status. It\u2019s an editable file; therefore, once generated, don\u2019t forget to protect its integrity with a &lt;a href=\"https:\/\/sectigostore.com\/code-signing\/sectigo-code-signing-certificate\"&gt;trusted code signing certificate&lt;\/a&gt;.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Invest in an automated website security checker tool&lt;\/strong&gt;. Manually detecting and blocking web-based attacks in real time is virtually impossible to do manually, as there\u2019s too much noise and data to get through. &lt;a href=\"https:\/\/sectigostore.com\/blog\/how-to-perform-a-website-security-check\/\"&gt;Website security checker tools&lt;\/a&gt; like &lt;a href=\"https:\/\/sectigostore.com\/sitelock.aspx\"&gt;SiteLock&lt;\/a&gt; will &lt;a href=\"https:\/\/www.youtube.com\/watch?v=Jj5WKG31XL4\"&gt;do the job &lt;\/a&gt;&lt;a href=\"https:\/\/www.youtube.com\/watch?v=Jj5WKG31XL4\"&gt;in a breeze&lt;\/a&gt;. &lt;a href=\"https:\/\/sectigostore.com\/website-security\/hacker-guardian-pci-scan-control-center\"&gt;HackerGuardian&lt;\/a&gt; will even monitor your PCI DSS version 4 compliance, suggest fixes, and generate a ready-to-submit PCI DSS compliance report.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:image {\"id\":3345,\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --&gt;&lt;\/p&gt;\n&lt;figure class=\"wp-block-image size-full\"&gt;&lt;img class=\"wp-image-3345\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/hackerguardian-pci-dss-scanner-dashboard-example.png\" alt=\"A screenshot of the HackerGuardian dashboard\" \/&gt;\n&lt;figcaption class=\"wp-element-caption\"&gt;&lt;em&gt;Image source: &lt;a href=\"https:\/\/www.hackerguardian.com\/about-hackerguardian\"&gt;HackerGuardian.com&lt;\/a&gt;. Check your level of PCI DSS 4 compliance with HackerGuardian.&lt;\/em&gt;&lt;\/figcaption&gt;\n&lt;\/figure&gt;\n&lt;p&gt;&lt;!-- \/wp:image --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:buttons --&gt;&lt;\/p&gt;\n&lt;div class=\"wp-block-buttons\"&gt;&lt;!-- wp:button --&gt;\n&lt;div class=\"wp-block-button\"&gt;&lt;a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sectigostore.com\/website-security\/hackerguardian-pci-compliance-scanner\"&gt;Learn More About HackerGuardian&lt;\/a&gt;&lt;\/div&gt;\n&lt;p&gt;&lt;!-- \/wp:button --&gt;&lt;\/p&gt;\n&lt;\/div&gt;\n&lt;p&gt;&lt;!-- \/wp:buttons --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Protect your scripts&lt;\/strong&gt;. Implement &lt;a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Cross_Site_Scripting_Prevention_Cheat_Sheet.html\"&gt;OWASP\u2019s recommendations&lt;\/a&gt; to shield your payment page from &lt;a href=\"https:\/\/sectigostore.com\/blog\/what-is-cross-site-scripting-how-to-prevent-cross-site-scripting-attacks\/\"&gt;cross-site script&lt;\/a&gt; (XSS) attacks. Ensure 24\/7 automated XSS and other attack detection with &lt;a href=\"https:\/\/sectigostore.com\/sitelock.aspx\"&gt;Sectigo SiteLock Website Security&lt;\/a&gt; scanner. From restricting unsafe scripts to content security policies, &lt;a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Content_Security_Policy_Cheat_Sheet.html\"&gt;OWASP's Content Security Policy&lt;\/a&gt; cheat sheet is a goldmine of tips and tricks.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:heading {\"level\":3} --&gt;&lt;\/p&gt;\n&lt;h3 class=\"wp-block-heading\"&gt;PCI DSS 4.0 \u2014 Requirement 7: Restrict Access to System Components and Cardholder Data by Business Need to Know&lt;\/h3&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;In February 2024, about &lt;a href=\"https:\/\/www.paymentsdive.com\/news\/amex-cardholder-data-exposed-merchant-processor-hack\/709302\/\"&gt;1,300 American Express cardholders'&lt;\/a&gt; data were exposed due to unauthorized access to a third-party service provider's system. Boost the security of your components and cardholder data to comply with these changes before the bell rings in March 2025.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Implement access control policies&lt;\/strong&gt;. &lt;a href=\"https:\/\/owasp.org\/Top10\/A01_2021-Broken_Access_Control\/\"&gt;Broken access control&lt;\/a&gt; is the top threat listed in the &lt;a href=\"https:\/\/owasp.org\/www-project-top-ten\/\"&gt;OWASP Top 10 Web Application Security Risks&lt;\/a&gt;. Don\u2019t be too generic. Your policies should cover all user roles, systems, and data they can access to. Short of ideas? Check out the &lt;a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html\"&gt;OWASP Authorization &lt;\/a&gt;C&lt;a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html\"&gt;heat &lt;\/a&gt;S&lt;a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html\"&gt;heet&lt;\/a&gt;.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Follow the &lt;\/strong&gt;&lt;a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/principle-of-least-privilege-POLP\"&gt;&lt;strong&gt;principle of the least privilege&lt;\/strong&gt;&lt;\/a&gt;&lt;strong&gt; (POLP)&lt;\/strong&gt;. \u201cYou shall not pass,\u201d declared Gandalf in &lt;em&gt;The Lord of the Rings&lt;\/em&gt;. Tell unauthorized third parties the same. Disable access to data by default. Grant access to only whom and what is required. For instance, an administrator doesn't need to view cardholders' data to grant viewing access to them, right?&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Delete what\u2019s not needed&lt;\/strong&gt;. Did a user change roles or departments? Did you stop dealing with a third party who had access to your systems? Don\u2019t wait \u2014 delete their accounts immediately to remove unnecessary access.&nbsp;&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:heading {\"level\":3} --&gt;&lt;\/p&gt;\n&lt;h3 class=\"wp-block-heading\"&gt;PCI DSS 4.0 \u2014 Requirement 8: Identify Users and Authenticate Access to System Components&lt;\/h3&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Over &lt;a href=\"https:\/\/www.forbes.com\/advisor\/business\/software\/american-password-habits\/\"&gt;75% of U.S. users&lt;\/a&gt; surveyed by Forbes Advisor in 2024 admitted having their personally identifiable information (PII) stolen through hacked accounts. Yup. This section is all about securing accesses and passwords with different methods.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Implement &lt;\/strong&gt;&lt;a href=\"https:\/\/aws.amazon.com\/what-is\/mfa\/\"&gt;&lt;strong&gt;multifactor authentication&lt;\/strong&gt;&lt;\/a&gt;&lt;strong&gt; (MFA) wherever possible&lt;\/strong&gt;. Require users looking to access your &lt;a href=\"https:\/\/www.pcisecuritystandards.org\/glossary\/cde\/\"&gt;cardholder data environment&lt;\/a&gt; (CDE), and other systems to provide two or more verification factors (e.g., a password and a one-time security code or a secure token).&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Shield credentials from malicious snoopers&lt;\/strong&gt;. Protect applications and system passwords in transit from &lt;a href=\"https:\/\/www.techtarget.com\/iotagenda\/definition\/man-in-the-middle-attack-MitM\"&gt;man-in-the-middle attacks&lt;\/a&gt; (MITM) with an &lt;a href=\"https:\/\/sectigostore.com\/ssl-types\/ov-ssl-certificates\"&gt;SSL\/TLS certificate&lt;\/a&gt;. The &lt;a href=\"https:\/\/sectigostore.com\/blog\/what-is-transport-layer-security-a-breakdown-of-the-tls-encryption-protocol\/\"&gt;encrypted connection&lt;\/a&gt; will scramble the transmitted data. Try to steal and\/or use those encrypted data now, hackers!&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:image {\"id\":3346,\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --&gt;&lt;\/p&gt;\n&lt;figure class=\"wp-block-image size-full\"&gt;&lt;img class=\"wp-image-3346\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/ssl-tls-certificates-enabe-https-security.png\" alt=\"An illustration that shows how enabling the SSL\/TLS protocol (using an SSL\/TLS certificate) helps protect your data in transit \" \/&gt;\n&lt;figcaption class=\"wp-element-caption\"&gt;&lt;em&gt;Image caption: The graphic shows how SSL\/TLS certificates shield cardholder\u2019s data in transit from MITM attacks and snooping.&lt;\/em&gt;&lt;\/figcaption&gt;\n&lt;\/figure&gt;\n&lt;p&gt;&lt;!-- \/wp:image --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Never hardcode passwords&lt;\/strong&gt;. According to GitGuardian\u2019s 2023 scan data, &lt;a href=\"https:\/\/www.gitguardian.com\/state-of-secrets-sprawl-report-2024\"&gt;8 million GitHub commits&lt;\/a&gt; exposed at least one secret (e.g., credentials or keys). The takeaway? Don\u2019t &lt;a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/798.html\"&gt;hardcode credentials&lt;\/a&gt;. Use secret &lt;a href=\"https:\/\/soteri.io\/blog\/best-code-scanning-tools\"&gt;scanners&lt;\/a&gt; (GitHub offers &lt;a href=\"https:\/\/blog.gitguardian.com\/announcing-has-my-secret-leaked\/\"&gt;a free one&lt;\/a&gt; too) to detect and delete them.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:heading {\"level\":3} --&gt;&lt;\/p&gt;\n&lt;h3 class=\"wp-block-heading\"&gt;PCI DSS 4.0 \u2014 Requirement 9: Restrict Physical Access to Cardholder Data&lt;\/h3&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Did you know that point of sale (POS) terminals and &lt;a href=\"https:\/\/www.pcisecuritystandards.org\/glossary\/poi\/\"&gt;points of interaction&lt;\/a&gt; (POI) are subject to &lt;a href=\"https:\/\/www.securityweek.com\/vulnerabilities-expose-pax-payment-terminals-to-hacking\/\"&gt;vulnerabilities&lt;\/a&gt; as well and can be &lt;a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ncr-suffers-aloha-pos-outage-after-blackcat-ransomware-attack\/\"&gt;disabled via ransomware attacks&lt;\/a&gt;&lt;a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ncr-suffers-aloha-pos-outage-after-blackcat-ransomware-attack\/\"&gt;,&lt;\/a&gt; too? No one and nothing is safe in the digital world. To protect your POI:&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Set up regular inspections&lt;\/strong&gt;. Check your POI's hardware and software. A checklist based on potential risks and new known vulnerabilities will ensure no stone will be left unturned.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Stay up to date with new threats&lt;\/strong&gt;. Subscribe to vulnerability catalog updates and cybersecurity newsletters. The NIST &lt;a href=\"https:\/\/nvd.nist.gov\/\"&gt;National Vulnerability Database&lt;\/a&gt; (NVD) and &lt;a href=\"https:\/\/cve.mitre.org\/\"&gt;MITRE\u2019s &lt;\/a&gt;&lt;a href=\"https:\/\/cve.mitre.org\/\"&gt;common vulnerabilities exposure (&lt;\/a&gt;&lt;a href=\"https:\/\/cve.mitre.org\/\"&gt;CVE&lt;\/a&gt;) database are two of the best sources you can refer to.&nbsp;&nbsp;&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:heading {\"level\":3} --&gt;&lt;\/p&gt;\n&lt;h3 class=\"wp-block-heading\"&gt;PCI DSS 4.0 \u2014 Requirement 10: Log and Monitor All Access to System Components and Cardholder Data&lt;\/h3&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;We get it: effective log management and analysis is never easy. It gets even more complicated if your organization logs an average of &lt;a href=\"https:\/\/klaviyo.tech\/logging-klaviyo-how-we-log-10-billion-events-a-day-c05902b8b538?gi=2961baa2f906\"&gt;9.5 billion&lt;\/a&gt; events a day, as Klaviyo does. However, logs are a vital component for security incident detection\/response and PCI DSS 4.0 compliance.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Once again, OWASP comes to the rescue with some &lt;a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authorization_Cheat_Sheet.html#implement-appropriate-logging\"&gt;log implementation best practices&lt;\/a&gt;. On top of it:&nbsp;&nbsp;&nbsp;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Automate log analysis and monitoring&lt;\/strong&gt;. There are a plethora of &lt;a href=\"https:\/\/signoz.io\/comparisons\/log-analysis-tools\/\"&gt;paid and open-source log analysis tool&lt;\/a&gt;&lt;a href=\"https:\/\/signoz.io\/comparisons\/log-analysis-tools\/\"&gt;s&lt;\/a&gt; out there. Pick one or more. They\u2019ll help you detect and promptly address suspicious access to system components and cardholder data. Spotting critical security control issues won't be a problem either.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Safeguard your logs&lt;\/strong&gt;. Access logs to system components and cardholder data contain sensitive information. Use &lt;a href=\"https:\/\/www.thesslstore.com\/blog\/types-of-encryption-encryption-algorithms-how-to-choose-the-right-one\/\"&gt;strong encryption algorithms&lt;\/a&gt;. Apply strict &lt;a href=\"https:\/\/doi.org\/10.6028\/NIST.SP.800-192\"&gt;access control policies&lt;\/a&gt; against unauthorized access, and tampering.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Review your logs often&lt;\/strong&gt;. Check your logs for anomalies or suspicious activities (e.g., too many failed logins in a short period of time, accesses from dodgy IP addresses or countries, etc.).&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:heading {\"level\":3} --&gt;&lt;\/p&gt;\n&lt;h3 class=\"wp-block-heading\"&gt;PCI DSS 4.0 \u2014 Requirement 11: Test Security of Systems and Networks Regularly&lt;\/h3&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;In Q1 2024, Kaspersky reports that MITRE\u2019s &lt;a href=\"https:\/\/www.cve.org\/\"&gt;CVE&lt;\/a&gt; Program registered &lt;a href=\"https:\/\/securelist.com\/vulnerability-report-q1-2024\/112554\/\"&gt;3,965 vulnerabilities&lt;\/a&gt;. That\u2019s an average of 1,321 vulnerabilities per month in those first three months!&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Periodically testing systems and network security is the core of this section. It'll guarantee that vulnerabilities and security issues are identified and addressed promptly and minimize the risk of leaks and fraudulent activities.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Scan systems with &lt;\/strong&gt;&lt;a href=\"https:\/\/sectigostore.com\/sitelock.aspx\"&gt;&lt;strong&gt;Sitelock&lt;\/strong&gt;&lt;\/a&gt;&lt;strong&gt; Pro or Business&lt;\/strong&gt;. Both tools will help you find system flaws before the bad guys do. They\u2019ll automatically check and patch your core applications, websites, &lt;a href=\"https:\/\/www.techtarget.com\/searchcontentmanagement\/definition\/content-management-system-CMS\"&gt;content management systems&lt;\/a&gt; (CMSs), and more. And you\u2019ll get a warning email every time an issue is found.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Run thousands of diagnostic tests&lt;\/strong&gt;. Schedule your vulnerability tests with &lt;a href=\"https:\/\/sectigostore.com\/website-security\/hacker-guardian-pci-scan-control-center\"&gt;HackerGuardian PCI Compliance tool&lt;\/a&gt;. It can &lt;a href=\"https:\/\/sectigostore.com\/website-security\/pci-scanning-enterprise-edition\"&gt;scan up to 20&lt;\/a&gt; servers (depending on the package chosen). You\u2019ll get a super detailed report based on over 30,000 diagnostic tests.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:embed {\"url\":\"https:\/\/www.youtube.com\/watch?v=_6R94FUmhWs\",\"type\":\"video\",\"providerNameSlug\":\"youtube\",\"responsive\":true,\"className\":\"wp-embed-aspect-16-9 wp-has-aspect-ratio\"} --&gt;&lt;\/p&gt;\n&lt;figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"&gt;\n&lt;div class=\"wp-block-embed__wrapper\"&gt;https:\/\/www.youtube.com\/watch?v=_6R94FUmhWs&lt;\/div&gt;\n&lt;\/figure&gt;\n&lt;p&gt;&lt;!-- \/wp:embed --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Set up alerts for critical unauthorized changes&lt;\/strong&gt;. Implement an alert system for payment pages' unauthorized modifications to &lt;a href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Glossary\/HTTP_header\"&gt;HTTP headers&lt;\/a&gt; and content. Use the tools suggested above to scan your website for potential XSS. Don't miss the &lt;a href=\"https:\/\/owasp.org\/www-project-secure-headers\/\"&gt;OWASP secure headers project&lt;\/a&gt; page and the related &lt;a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/HTTP_Headers_Cheat_Sheet.html\"&gt;cheat sheet&lt;\/a&gt; for additional tips.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:heading {\"level\":3} --&gt;&lt;\/p&gt;\n&lt;h3 class=\"wp-block-heading\"&gt;PCI DSS 4.0 \u2014 Requirement 12: Support Information Security with Organizational Policies and Programs&lt;\/h3&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;This last section highlights the importance of organizational policies and programs for effective card data protection. However, when employees are blissfully unaware of such procedures and standards, all sorts of security issues are right around the corner. Verizon\u2019s latest report proved it: &lt;a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\"&gt;68% of data breaches&lt;\/a&gt; in 2023 involved human error (i.e., non-malicious human actions).&nbsp;&nbsp;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Inform your peers and employees&lt;\/strong&gt;. Publish all security procedures, guidelines, and policies on your internal website to facilitate access to employees and stakeholders.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Set up ad hoc training sessions&lt;\/strong&gt;. Train your personnel with courses online or in-person sessions. Include a short final verification test to validate their acquired knowledge.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Review and keep all information and software up to date&lt;\/strong&gt;. Technology changes fast and so do attackers\u2019 strategies and approaches. Harness the power of checklists to review the security of all your hardware, software, and protocols. Last but not least, always choose the latest &lt;a href=\"https:\/\/sectigostore.com\/blog\/what-is-an-ssl-tls-cipher-suite\/\"&gt;cryptographic cipher suites&lt;\/a&gt;. They are the most secure.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;This is it. A neat overview of PCI DSS 4.0\u2019s changes coming into effect by Q2 2025. Don't stop reading. There's more to know before kicking off your compliance activities.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:heading --&gt;&lt;\/p&gt;\n&lt;h2 class=\"wp-block-heading\"&gt;PCI DSS 4.0: Which Requirements Apply to My Organization?&lt;\/h2&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;All companies handling payment data or accepting credit, debit, or digital card payments must be PCI DSS 4.0 compliant. However, not all businesses are created equal. For instance, service providers have 10 supplementary requirements to satisfy by March 31, 2025 before reaching compliance. (There are 11 service provider-related new requirements total in PCI DSS version 4.0, but one was effective immediately.)&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;This means that mom-and-pop shops won't have to meet the same standards required of big corporations and enterprises.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:image {\"id\":3347,\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --&gt;&lt;\/p&gt;\n&lt;figure class=\"wp-block-image size-full\"&gt;&lt;img class=\"wp-image-3347\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-40-service-provider-only-example.png\" alt=\"A screenshot of one of the service provider-specific requirements from the PCI DSS version 3.2.1 to version 4.0 transition document\" \/&gt;\n&lt;figcaption class=\"wp-element-caption\"&gt;&lt;em&gt;Image source: &lt;a href=\"https:\/\/docs-prv.pcisecuritystandards.org\/PCI%20DSS\/Standard\/PCI-DSS-v3-2-1-to-v4-0-Summary-of-Changes-r2.pdf\"&gt;PCI DSS version 4 summary of changes&lt;\/a&gt;. The screenshot shows an example of a new requirement for service providers only.&lt;\/em&gt;&lt;\/figcaption&gt;\n&lt;\/figure&gt;\n&lt;p&gt;&lt;!-- \/wp:image --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;To this effect, the PCI Security Standards Council created four different compliance levels based on credit card transaction volume. Each level requires the implementation of a specific set of security control rules.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Before plunging into the PCI DSS 4.0 list, check out our &lt;a href=\"https:\/\/sectigostore.com\/blog\/pci-merchant-compliance-levels\/\"&gt;merchant compliance comprehensive guide&lt;\/a&gt; and do a first &lt;a href=\"https:\/\/sectigostore.com\/blog\/how-to-do-a-pci-self-assessment\/\"&gt;PCI self-assessment&lt;\/a&gt;. You'll immediately find out which level your organization fits into and its requirements.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:image {\"id\":3348,\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --&gt;&lt;\/p&gt;\n&lt;figure class=\"wp-block-image size-full\"&gt;&lt;img class=\"wp-image-3348\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-version-4-merchant-compliance-levels.png\" alt=\"A graphc showing the four PCI DSS Merchant Complaince Levels\" \/&gt;\n&lt;figcaption class=\"wp-element-caption\"&gt;&lt;em&gt;Image caption: The graphic shows a high-level overview of the PCI DSS 4.0 merchant compliance levels.&lt;\/em&gt;&lt;\/figcaption&gt;\n&lt;\/figure&gt;\n&lt;p&gt;&lt;!-- \/wp:image --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:heading --&gt;&lt;\/p&gt;\n&lt;h2 class=\"wp-block-heading\"&gt;Why SSL Certificates and Code Signing Are Important for PCI Compliance?&lt;\/h2&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Every time a customer makes a payment online, their credit\/debit card or banking information is at risk of falling into the wrong hands. Phishing is another dangerous threat plaguing businesses accepting payments online. In 2023, Zscaler identified 745 million more attacks than in 2022, marking a &lt;a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/phishing-attacks-rise-58-year-ai-threatlabz-2024-phishing-report\"&gt;58% increase&lt;\/a&gt; year over year.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;And before you say it, nope, this likely isn't only due to some scanning tool improvements. Other software security providers noticed the same trend. Bolster, for example, recorded a &lt;a href=\"https:\/\/bolster.ai\/blog\/2024-state-of-phishing-statistics-online-scams\"&gt;94% &lt;\/a&gt;&lt;a href=\"https:\/\/bolster.ai\/blog\/2024-state-of-phishing-statistics-online-scams\"&gt;growth&lt;\/a&gt; in phishing attacks since 2020.&nbsp;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;So, an &lt;a href=\"https:\/\/sectigostore.com\/ssl-types\/ev-ssl-certificates\"&gt;SSL\/TLS certificate&lt;\/a&gt; issued by a &lt;a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-certificate-authority-certification-authorities-explained\/\"&gt;trusted certificate authority&lt;\/a&gt; (CA) will:&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Protect your websites from MITM attacks&lt;\/strong&gt;. The certificate uses a &lt;a href=\"https:\/\/www.thesslstore.com\/blog\/what-is-256-bit-encryption\/\"&gt;256-bit encryption key&lt;\/a&gt; to scramble the information in transit between the client and the server, making it virtually impossible for an attacker to decrypt it.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;Shield you from phishing attempts&lt;\/strong&gt;. On websites protected by &lt;a href=\"https:\/\/sectigostore.com\/ssl-certificates\/sectigo-ov-multi-domain-ssl\"&gt;SSL\/TLS certificates&lt;\/a&gt;, users can confirm the legitimacy of the site by verifying the website\u2019s owner identity (so long as the site owner opted for an organization- or extended-validation certificate). The URL will also start with \u201cHTTPS\u201d (&lt;a href=\"https:\/\/sectigostore.com\/blog\/port-443-everything-you-need-to-know-about-https-443\/\"&gt;hypertext transfer protocol secure&lt;\/a&gt;) to further reassure the user about the security of the page, showing the connection is encrypted.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:image {\"id\":3349,\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --&gt;&lt;\/p&gt;\n&lt;figure class=\"wp-block-image size-full\"&gt;&lt;img class=\"wp-image-3349\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/https-example-sectigostore-dot-com.png\" alt=\"A screenshot from SectigoStore.com that shows the website is secured using an SSL\/TLS certificate\" \/&gt;\n&lt;figcaption class=\"wp-element-caption\"&gt;Image source: &lt;a href=\"https:\/\/sectigostore.com\/blog\/\"&gt;SectigoStore.com blog&lt;\/a&gt;. The screenshot shows how to spot a website secured by a trusted SSL\/TLS certificate.&lt;\/figcaption&gt;\n&lt;\/figure&gt;\n&lt;p&gt;&lt;!-- \/wp:image --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;&lt;strong&gt;Help you achieve PCD DSS 4 and 4.0.1 compliance&lt;\/strong&gt;. &lt;a href=\"https:\/\/sectigostore.com\/ssl-certificates\/positivessl-ev\"&gt;SSL\/TLS certificates&lt;\/a&gt; are the backbone of PCI DSS compliance. They offer strong private keys and the latest cipher suites. Likewise, it guarantees that cardholders' data are stored and transmitted securely. Without it, compliance isn\u2019t possible.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Last but not least, &lt;a href=\"https:\/\/sectigostore.com\/code-signing\"&gt;trusted &lt;\/a&gt;&lt;a href=\"https:\/\/sectigostore.com\/code-signing\"&gt;code signing &lt;\/a&gt;&lt;a href=\"https:\/\/sectigostore.com\/code-signing\"&gt;certificates&lt;\/a&gt; will also, even if indirectly, help you reach PCI DSS 4.0 compliance. Add another layer of security against attacks by installing only signed plug-ins and components, and by signing SBOMs for software you create. And if you develop your own software or plug-ins, even just for internal use, code signing with a publicly trusted digital certificate is something you can\u2019t do without. It can help you meet &lt;a href=\"https:\/\/docs-prv.pcisecuritystandards.org\/Software%20Security\/Standard\/PCI-Secure-Software-Standard-v1_2.pdf\"&gt;PCI SSC\u2019s Software Standards&lt;\/a&gt;\u2019 security requirements.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:heading --&gt;&lt;\/p&gt;\n&lt;h2 class=\"wp-block-heading\"&gt;Final Thoughts About What You Need to Know About PCI DSS 4.0&lt;\/h2&gt;\n&lt;p&gt;&lt;!-- \/wp:heading --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Preparing for PCI DSS version 4.0's March 2025 deadline will take organizations time and work. However, understanding the changes is the first step to reaching compliance. The good news is that the things we've listed here today are things that every security-conscious organization should already be doing.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;Put to good use what you\u2019ve just learned. Start addressing the latest PCI DSS 4 requirements today by following the tips included in this article.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;&lt;!-- wp:list-item --&gt;\n&lt;li&gt;Use &lt;a href=\"https:\/\/sectigostore.com\/ssl-certificates\/enterprise-ssl-pro-ev\"&gt;SSL\/TLS certificates&lt;\/a&gt; to secure your sites and web apps to keep connections private and protect cardholder data during transmission over the network.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;Create, maintain, and digitally sign an SBOM as an inventory of your software.&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:list-item --&gt;&lt;\/p&gt;\n&lt;ul&gt;\n&lt;li style=\"list-style-type: none;\"&gt;\n&lt;ul&gt;\n&lt;li&gt;Invest in a malware and PCI-DSS compliance scan tool like &lt;a href=\"https:\/\/sectigostore.com\/website-security\/pci-scanning-enterprise-edition\"&gt;HackerGuardian&lt;\/a&gt;.&nbsp;&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;\/li&gt;\n&lt;\/ul&gt;\n&lt;p&gt;&lt;!-- \/wp:list-item --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:list --&gt;&lt;\/p&gt;\n&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;\/p&gt;\n&lt;p&gt;It'll protect your organization and customers' sensitive data, make your reputation shine, increase customers' trust, and, in case of a data breach, it'll help you minimize losses and avoid fines.&lt;\/p&gt;\n&lt;p&gt;&lt;!-- \/wp:paragraph --&gt;&lt;\/p&gt;__TVE_SHORTCODE_RAW___<\/div><\/div>","tve_custom_css":"@media (min-width: 300px){[data-css=\"tve-u-05f5a72cce5e89\"] { background-color: rgb(255, 255, 255) !important; border: medium none !important; padding: 0px !important; --tve-applied-border: none !important; }[data-css=\"tve-u-35f5a72cce5e90\"] .tcb-button-link { letter-spacing: 2px; border-radius: 54px; overflow: hidden; padding: 18px; border: medium none; --tve-applied-border: none; box-shadow: rgba(0, 0, 0, 0.09) 0px 8px 12px 0px; --tve-applied-box-shadow: 0px 8px 12px 0px rgba(0,0,0,0.09); background-image: linear-gradient(var(--tcb-local-color-62516,rgb(19,114,211)),var(--tcb-local-color-62516,rgb(19,114,211))) !important; --tve-applied-background-image: linear-gradient(var$(--tcb-local-color-62516,rgb(19,114,211)),var$(--tcb-local-color-62516,rgb(19,114,211))) !important; background-size: auto !important; background-position: 50% 50% !important; background-attachment: scroll !important; background-repeat: no-repeat !important; }[data-css=\"tve-u-35f5a72cce5e90\"] .tcb-button-link span { color: rgb(255, 255, 255); --tcb-applied-color: #fff; }[data-css=\"tve-u-35f5a72cce5e90\"] { --tcb-local-color-62516: rgb(105,179,231) !important; margin-top: 0px !important; margin-bottom: 0px !important; }[data-css=\"tve-u-15f5a72cce5e8d\"] { width: 241px; float: none; display: block; margin-left: auto !important; margin-right: auto !important; }[data-css=\"tve-u-25f5a72cce5e8f\"] { margin-top: 0px; margin-left: 0px; }[data-css=\"tve-u-45f5a72cce5e91\"] { font-weight: var(--g-bold-weight,bold) !important; }:not(#tve) [data-css=\"tve-u-45f5a72cce5e91\"] { text-transform: none !important; }}","tve_user_custom_css":"","tve_globals":{"e":"1","font_cls":[]},"tcb2_ready":1,"tcb_editor_enabled":0,"tve_landing_page":"","_tve_header":"","_tve_footer":""},"categories":[79],"tags":[58,294,295],"class_list":["post-3341","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-other","tag-pci-dss","tag-pci-dss-4-0","tag-pci-dss-4-0-1","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What You Need to Know About PCI DSS 4.0 (and Version 4.0.1) - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"Discover what to know to reach PCI DSS 4.0 (and version 4.0.1) compliance with the remaining requirements coming into effect by March 2025.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What You Need to Know About PCI DSS 4.0 (and Version 4.0.1) - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"Discover what to know to reach PCI DSS 4.0 (and version 4.0.1) compliance with the remaining requirements coming into effect by March 2025.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-24T15:00:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-09T06:00:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-4-and-401-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nadia Bonini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nadia Bonini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-to-know-about-pci-dss-4-0-and-4-0-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-to-know-about-pci-dss-4-0-and-4-0-1\\\/\"},\"author\":{\"name\":\"Nadia Bonini\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/f4ce6500b99e7563f71f0d1d6394f135\"},\"headline\":\"What You Need to Know About PCI DSS 4.0 (and Version 4.0.1)\",\"datePublished\":\"2024-06-24T15:00:42+00:00\",\"dateModified\":\"2024-07-09T06:00:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-to-know-about-pci-dss-4-0-and-4-0-1\\\/\"},\"wordCount\":3646,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-to-know-about-pci-dss-4-0-and-4-0-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/pci-dss-4-and-401-feature.jpg\",\"keywords\":[\"PCI DSS\",\"PCI DSS 4.0\",\"PCI DSS 4.0.1\"],\"articleSection\":[\"Other\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-to-know-about-pci-dss-4-0-and-4-0-1\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-to-know-about-pci-dss-4-0-and-4-0-1\\\/\",\"name\":\"What You Need to Know About PCI DSS 4.0 (and Version 4.0.1) - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-to-know-about-pci-dss-4-0-and-4-0-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-to-know-about-pci-dss-4-0-and-4-0-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/pci-dss-4-and-401-feature.jpg\",\"datePublished\":\"2024-06-24T15:00:42+00:00\",\"dateModified\":\"2024-07-09T06:00:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/f4ce6500b99e7563f71f0d1d6394f135\"},\"description\":\"Discover what to know to reach PCI DSS 4.0 (and version 4.0.1) compliance with the remaining requirements coming into effect by March 2025.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-to-know-about-pci-dss-4-0-and-4-0-1\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-to-know-about-pci-dss-4-0-and-4-0-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-to-know-about-pci-dss-4-0-and-4-0-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/pci-dss-4-and-401-feature.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/pci-dss-4-and-401-feature.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"The feature image for an article on PCI DSS version 4.0 and version 4.0.1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-to-know-about-pci-dss-4-0-and-4-0-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What You Need to Know About PCI DSS 4.0 (and Version 4.0.1)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/f4ce6500b99e7563f71f0d1d6394f135\",\"name\":\"Nadia Bonini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/871770d58b7b0abd48f90fb2f9643895c766b7ab6c1d4fa58e3651941cdc9e63?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/871770d58b7b0abd48f90fb2f9643895c766b7ab6c1d4fa58e3651941cdc9e63?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/871770d58b7b0abd48f90fb2f9643895c766b7ab6c1d4fa58e3651941cdc9e63?s=96&d=mm&r=g\",\"caption\":\"Nadia Bonini\"},\"description\":\"Nadia is a technical writer with more than 15 years of experience in IT, software development projects, email and cybersecurity. She has worked for leaders in the IT industry and Fortune 500 companies. A Certified CSPO mail application security product owner and a former application security engineer, she also works as a professional translator. She is a big fan of Ubuntu, traveling and Japan.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What You Need to Know About PCI DSS 4.0 (and Version 4.0.1) - InfoSec Insights","description":"Discover what to know to reach PCI DSS 4.0 (and version 4.0.1) compliance with the remaining requirements coming into effect by March 2025.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/","og_locale":"en_US","og_type":"article","og_title":"What You Need to Know About PCI DSS 4.0 (and Version 4.0.1) - InfoSec Insights","og_description":"Discover what to know to reach PCI DSS 4.0 (and version 4.0.1) compliance with the remaining requirements coming into effect by March 2025.","og_url":"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/","og_site_name":"InfoSec Insights","article_published_time":"2024-06-24T15:00:42+00:00","article_modified_time":"2024-07-09T06:00:33+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-4-and-401-feature.jpg","type":"image\/jpeg"}],"author":"Nadia Bonini","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Nadia Bonini","Est. reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/"},"author":{"name":"Nadia Bonini","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/f4ce6500b99e7563f71f0d1d6394f135"},"headline":"What You Need to Know About PCI DSS 4.0 (and Version 4.0.1)","datePublished":"2024-06-24T15:00:42+00:00","dateModified":"2024-07-09T06:00:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/"},"wordCount":3646,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-4-and-401-feature.jpg","keywords":["PCI DSS","PCI DSS 4.0","PCI DSS 4.0.1"],"articleSection":["Other"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/","url":"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/","name":"What You Need to Know About PCI DSS 4.0 (and Version 4.0.1) - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-4-and-401-feature.jpg","datePublished":"2024-06-24T15:00:42+00:00","dateModified":"2024-07-09T06:00:33+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/f4ce6500b99e7563f71f0d1d6394f135"},"description":"Discover what to know to reach PCI DSS 4.0 (and version 4.0.1) compliance with the remaining requirements coming into effect by March 2025.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-4-and-401-feature.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/06\/pci-dss-4-and-401-feature.jpg","width":1600,"height":1000,"caption":"The feature image for an article on PCI DSS version 4.0 and version 4.0.1"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-to-know-about-pci-dss-4-0-and-4-0-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What You Need to Know About PCI DSS 4.0 (and Version 4.0.1)"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/f4ce6500b99e7563f71f0d1d6394f135","name":"Nadia Bonini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/871770d58b7b0abd48f90fb2f9643895c766b7ab6c1d4fa58e3651941cdc9e63?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/871770d58b7b0abd48f90fb2f9643895c766b7ab6c1d4fa58e3651941cdc9e63?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/871770d58b7b0abd48f90fb2f9643895c766b7ab6c1d4fa58e3651941cdc9e63?s=96&d=mm&r=g","caption":"Nadia Bonini"},"description":"Nadia is a technical writer with more than 15 years of experience in IT, software development projects, email and cybersecurity. She has worked for leaders in the IT industry and Fortune 500 companies. A Certified CSPO mail application security product owner and a former application security engineer, she also works as a professional translator. She is a big fan of Ubuntu, traveling and Japan."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/3341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=3341"}],"version-history":[{"count":0,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/3341\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/3353"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=3341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=3341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=3341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}