Huntress Acquires Inside Agent: A New Era for Identity ProtectionFree Trial
Menu
InvestorsCareersBlogAboutAcademySupportContact
LoginSign up
PCI DSS v4.0 · CARDHOLDER DATA PROTECTION · QSA VALIDATION · SEGMENTATION TESTING

PCI DSS v4.0 compliancevalidated by operators.Not documentation factories.

Validate encryption, segmentation, access controls, and logging for cardholder data protection under PCI DSS v4.0. Covers card-present and e-commerce environments, third-party assessments, and QSA-ready documentation.

PCI DSS v4.0 · CARDHOLDER DATA SECURITY

v4.0 raises the bar. Your controls must follow.

PCI DSS v3.2.1 retired March 31, 2024. All organisations must now operate under v4.0 — with tighter MFA requirements, mandatory payment page script integrity controls, and continuous vulnerability management. We validate real controls, not just documentation.

0

Requirement categories covered

0+

QSA-ready evidence items

0

Security controls deployed

0%

QSA engagement time reduction

Network Security

Firewall rules, network diagrams, CDE segmentation and traffic restriction controls.

Data Encryption

AES-256 at rest, TLS 1.3 in transit, HSM-backed key management for all PAN.

Access Control

MFA enforced for all CDE access, least-privilege model, quarterly access reviews.

Continuous Testing

Quarterly ASV scans, annual pen tests, payment page integrity monitoring, seg tests.

PCI DSS FRAMEWORK

12 Requirements. One validated standard.

REQ 1v4.0: enhanced

Network Security Controls

Network

5

sub-reqs

v4.0 note: Expanded beyond firewalls to all network security controls; added cloud-environment specifics and 6-month rule review cadence

KEY CONTROLS

Firewall install & maintenance

Network diagram (incl. wireless)

Restricted inbound/outbound CDE traffic

No direct public-internet CDE access

Firewall rule review every 6 months

newNew in v4.0
enhancedEnhanced in v4.0
unchangedUnchanged from v3.2.1

CARDHOLDER DATA ENVIRONMENT

CDE scoping. Define your compliance boundary.

Incorrect CDE scoping is one of the most common QSA findings. Too broad — unnecessary compliance burden. Too narrow — gaps and breach liability. Get the boundary right from day one.

SCOPE ZONES

CDE

PAN stored here

OOS (segmented)

Connected-to systems

CDE

Cardholder Data Environment

Systems that store, process, or transmit cardholder data (CHD) or sensitive authentication data (SAD). Directly in scope. Every PCI DSS requirement applies.

EXAMPLE SYSTEM TYPES

Payment application servers
Card databases
POS terminals
E-commerce checkout systems
HSMs (Hardware Security Modules)

SCOPE REDUCTION TECHNIQUES

Technique
Scope Impact
Implementation Effort
Compliance Benefit
Network Segmentation
Removes connected systems from scope
High
↓ 60–80% scope reduction
Tokenisation
Replace PAN with tokens — no CHD stored
Medium
Eliminates Req 3 obligations
P2PE (Point-to-Point Encryption)
CHD encrypted at capture — never exposed
Medium
Reduces to SAQ P2PE-HW
Hosted Payment Fields
Redirect CHD to third-party processor
Low
SAQ A eligibility

v3.2.1 → v4.0 MIGRATION

What changed in v4.0. The delta that matters.

PCI DSS v3.2.1 retired March 31, 2024. Eight key areas changed significantly. Some future-dated requirements (marked below) take effect March 31, 2025.

Requirement Area
v3.2.1 (retired)
v4.0 (current)
Impact
MFA Requirement
Required for remote access only
Required for ALL non-console access into CDE (Req 8.4.2)
high
Password Length
Minimum 7 characters
Minimum 12 characters (Req 8.3.6)
medium
Vulnerability Management
Quarterly internal/external scans
Continuous vulnerability monitoring; targeted risk analysis
high
Web-Skimming Prevention
Not explicitly addressed
Req 6.4.3: Script inventory + integrity check on payment pages
new
Change/Tamper Detection
Not required
Req 11.6.1: Payment page change & tamper detection mechanism
new
Custom Approach
Not available — defined approach only
Alternative controls via documented risk analysis (12.3.2)
medium
Patch Management
Critical patches within 1 month
All patches at highest available level (Req 6.3.3)
medium
Critical Control Alerts
No explicit SLA
Automated alerts with 3 business-day response SLA (Req 10.7.3)
medium
newNew requirement — no prior equivalent
highHigh operational impact
mediumMedium impact — process/tooling change

VALIDATION ROADMAP

Compliance lifecycle. 8 phases to AOC.

P1

CDE Scoping

W1–3

Identify all systems storing, processing, or transmitting cardholder data. Map all data flows into and out of the CDE. Document network diagrams with CDE boundaries clearly marked.

Milestone KPI23 CDE systems mapped

ALL PHASES

REQ 11.3 · NETWORK ISOLATION VALIDATION

Segmentation testing. CDE isolation confirmed.

PCI DSS v4.0 Req 11.3.4 mandates segmentation pen testing annually and after any segmentation-relevant change. We automate the test cycle and provide QSA-ready evidence for every boundary test.

NETWORK LAYER ARCHITECTURE

INTERNET

Untrusted public network

3 tests

DMZ

Web servers / WAF / load balancers

5 tests

CDE

Payment app · DB · HSM

8 tests

INTERNAL

Corporate network (segmented)

4 tests

OOS

Out-of-scope (air-gapped)

2 tests
SEGMENTATION TEST RESULTS
22 tests / last 30d
PASS

External Firewall Rule Review

Internet → DMZ boundary

All 247 rules reviewed; 3 stale rules removed

PASS

DMZ → CDE Segmentation Pen Test

DMZ host → payment DB

No path found from DMZ to cardholder database

PASS

Internal Host → CDE Access Test

Corp workstation → CDE VLAN

VLAN ACL blocks all lateral movement

PASS

Wireless Network → CDE Path

Guest WiFi → CDE subnet

Wireless fully air-gapped from CDE VLAN

WARN

Service Provider Access Review

3P vendor VPN → CDE systems

1 of 4 vendor VPN accounts lacks MFA — remediation scheduled

PASS

POS Terminal Network Isolation

POS VLAN → corporate network

POS VLAN restricted to payment gateway IP only

PASS

E-Commerce Server Segmentation

Web tier → payment app tier

WAF + internal ALB enforces single-path only

WARN

CDE Outbound Traffic Control

CDE → external destinations

Approved egress list: 98% compliant — 2 rules under review

22 tests total20 PASS · 2 WARN · 0 FAIL

QSA-READY DOCUMENTATION

Evidence engine. 400+ items, audit-ready.

EVIDENCE CATEGORIES

Policies & Procedures

Req 1, 2, 7, 8, 9, 12

48

items

Network Diagrams

Req 1, 2, 11

12

items

Vulnerability Scans

Req 11

52

items

Pen Test Reports

Req 11

8

items

Access Reviews

Req 7, 8

36

items

Change Records

Req 6, 8

94

items

Encryption Config

Req 3, 4

22

items

Training Records

Req 12

128

items

QSA READINESS SCORE

92/ 100

Audit-Ready

2 minor gaps pending remediation. 400+ evidence items compiled and linked to requirement sub-sections.

Policies & Procedures
100%
Technical Controls
98%
Scan Coverage
100%
Pen Test Currency
92%

QSA ENGAGEMENT STATS

Avg. ROC completion

8–10 weeks

Evidence items

400+ organised

Audit prep reduction

↓ 50%

AOC issuance

Annual cycle

REQ 5, 6, 11 · CONTINUOUS VULNERABILITY MANAGEMENT

Vuln management. Continuous — not quarterly.

PCI DSS v4.0 moved from quarterly-scan-only to continuous monitoring. Req 6.3.3 requires all patches at highest available level. Req 11.3 mandates targeted risk analysis to determine internal scan frequency.

ACTIVE SCAN PROGRAMME

PASS

External ASV Scan

3 days ago

Quarterly (Req 11.3.2)

Approved Scanning Vendor

Clean
PASS

Internal Network Scan

3 days ago

Quarterly (Req 11.3.1)

Tenable / Qualys

H:1
PASS

Web Application DAST

1 day ago

After code change (Req 6)

Burp Suite / OWASP ZAP

Clean
PASS

Payment Page Integrity

4 min ago

Continuous (Req 11.6.1)

Script hash comparison

Clean
WARN

Container Image Scan

2 hrs ago

On push (Req 6.3.3)

Trivy / Spakto

H:2
PASS

CDE Config Compliance

1 hr ago

Continuous (Req 2)

Chef InSpec / Lynis

Clean

REMEDIATION SLA — PCI DSS v4.0

Critical
1d SLA
High
7d SLA
Medium
30d SLA
Low
90d SLA
Critical: Active exploitation risk — patch same day
High: Exploitable without privileges — patch within 1 week
Medium: Complex exploitation required — patch within 30 days
Low: Limited exposure — patch within next quarterly cycle

v4.0 PATCH REQUIREMENT

Req 6.3.3 requires all security patches and updates installed at the highest available level — moving beyond the previous critical-patches-within-30-days model. Continuous patch monitoring is now mandatory.

WHY SPAKTO

Not consultants. PCI DSS accelerators.

100%

v4.0 Coverage

All 12 requirements including new Req 6.4.3, 8.4.2, 11.6.1

Frequently Asked

Frequently asked
questions.

Still have questions?
Our security engineers answer within one business day.
Ask a question

Ready for PCI DSS v4.0?

Validate your CDE, close v4.0 gaps, and reach QSA-ready attestation. Start with a no-obligation scope and gap assessment.

PCI DSS v4.012 RequirementsCDE ScopingSegmentation TestingQSA-ReadyAOC