The latest version of the PCI DSS certification framework comprises several significant changes. Sam Peters at ISMS.online describes them and explains how organisations should react
Today, financial gain is the primary motivation in 95% of cyber-attacks, with many threat actors directly going after payment information.
Indeed, thousands of card details are compromised during online attacks in the UK every year, with hackers regularly exploiting security weaknesses on websites to capture sensitive data before it reaches merchants’ secure payment forms.
Consequently, around £1.7 million is stolen every month through card fraud. As online shopping and virtual economies continue to be a big part of everyday life, credit card fraud is unfortunately likely to continue.
To try and mitigate this and better protect consumers’ details, organisations that process, store or transmit credit card information must comply with the Payment Card Industry Data Security Standard (PCI DSS) certification.
Having originally been formulated by a consortium of card giants, including Visa, MasterCard, American Express, Discover, and JCB, PCI DSS was established with the goal of safeguarding and optimising the security of sensitive cardholder data.
It outlines key security controls that apply to all entities involved in payment card processing, including merchants, processors, acquirers, issuers, and service providers, with the aim of minimising the risk of data breaches, fraud and identity theft. And while PCI DSS is not a law, it is a contractual obligation between merchants and major card brands, making compliance crucial for any business that handles card payments.
Changes in PCI DSS v4.0.1
Having first been introduced in 2006, the PCI DSS framework has naturally had to evolve in line with changes in the payment environment.
Today, the framework is now in its fourth iteration, with PCI DSS v4.0 being introduced in March 2024.This latest version comprises several significant changes versus its predecessor, having been designed to improve suitability and relevancy in relation to evolving technologies and cyber-threats. Compared to v3.2.1, v4.0 introduced more flexibility, allowing businesses to adapt requirements and achieve compliance in a manner tailored to their specific environments. Further, it also introduced 60 new requirements.
Now in 2025, organisations are faced with aligning with the latest iteration – PCI DSS 4.0.1 – with the mandatory compliance deadline taking effect from 31 March 2025. As of this date, PCI DSS v4.0.1 will supersede v4.0, while v3.2.1 will be officially retired.
As a limited revision, v4.0.1 doesn’t deviate significantly from v4.0. However, the update has made key refinements to the guidance relating to client-side payment security and comprehensive payment page protection, with the aim of ensuring more effective implementation.
This is crucial, helping firms to more effectively combat cyber-attacks targeting payment information specifically. However, businesses that are already compliant with v4.0 need not panic. While V4.0.1 supersedes V4.0, this latest iteration did not add any entirely new requirements beyond what was already outlined in v4.0.
Complying with v4.0.1
For those companies that aren’t yet compliant, it’s important to understand that the consequences of PCI DSS non-compliance can be significant, potentially leading to legal repercussions, fines and penalties. Further, firms may also be held liable for costs associated with data breaches, including forensic investigations and card replacements.
So, how can companies avoid these consequences and meet the requirements of the PCI DSS?
Unfortunately, there’s no straightforward answer to this. Every business is different, and complying with PCI DSS will ultimately depend on the complexity of your enterprise and the current data security measures that you have in place.
However, there are several steps that firms can take to assess the necessary changes that they need to make.
#1 – Understand your compliance level
Critically, PCI DSS compliance is categorised into four levels, ranging from Level 1 for entities processing over six million card transactions annually, to Level 4 for those handling fewer than 20,000 transactions. Each level demands different reporting requirements. Level 1 entities, for example, are required to undergo an annual Report on Compliance (ROC) by a Qualified Security Assessor (QSA), while Levels 2 to 4 may be eligible for a Self-Assessment Questionnaire (SAQ). Understanding your compliance level is crucial, helping to identify the scope of the assessment.
#2 – Understand your security posture
Once you have ascertained your compliance level, you can initiate the certification process, working to establish a thorough understanding of your current security posture and the measures your organisation has in place before implementing the relevant solutions.
#3 – Conduct a gap analysis
With an understanding of both your security posture and compliance requirements, organisations can begin to carry out gap analysis to identify areas where current security practices do not meet PCI DSS requirements. This analysis provides a roadmap for the implementation of necessary controls and security measures.
#4 – Implement required controls
Following that gap analysis, the next step is to implement the required security controls and processes. This includes configuring firewalls, encrypting data transmissions and establishing access controls, among other measures.
#5 – Embrace continuous improvement
PCI DSS compliance is not a one-time event, but a continuous process of monitoring, testing and improving your security posture. Regularly reviewing and updating security measures ensures ongoing compliance and protection of cardholder data.
Navigating the complexities of PCI DSS certification can be challenging. For firms that aren’t clear on where to begin, working with a qualified partner can pay dividends. By helping you to identify best practices, manage documentation, track the implementation of controls, and achieve continuous monitoring, working with an expert can help to simplify the compliance journey and achieve a solution catering to your organisation’s specific needs.
Sam Peters is Chief Product Officer at ISMS.online
Main image courtesy of iStockPhoto.com and Ridofranz
© 2025, Lyonsdown Limited. Business Reporter® is a registered trademark of Lyonsdown Ltd. VAT registration number: 830519543