New cybersecurity requirements are fast approaching for organizations that process payment card transactions.
In 2022, the PCI Security Standards Council (SSC) introduced PCI DSS 4.0 (now 4.0.1), a major update to the framework that expanded the list of mandatory security controls and introduced greater flexibility for businesses that must comply. Among the most impactful changes are 51 “future-dated” controls designed to address emerging threats in the payment industry, including phishing, e-commerce fraud, and skimming attacks.
These future-dated controls will become mandatory after March 31, 2025. Here are some of the most impactful changes that you need to know about before the deadline:
Minimum password length requirements are increasing to 12 characters in the latest version of PCI DSS; however, if the associated system does not support this 12-character requirement, then they must be at least eight characters. Passwords must also be unique, complex, and rotated periodically in accordance with previously defined PCI DSS requirements.
The latest version of PCI DSS strengthens password security by supporting password-less authentication in addition to traditional password-based methods. This comes after NIST recently supplemented publication 800-63B, approving properly implemented passkeys as AAL2-compliant, meaning they are recognized as a phishing-resistant form of multi-factor authentication (MFA). Organizations can now implement authentication methods such as Windows Hello, Google Passkeys, and Mac equivalents, as well as through cloud hosting providers (e.g., Google Cloud Platform) that integrate these tools for secure MFA access.
If your organization does decide to go “password-less,” then you are no longer required to adhere to the following requirements:
Requirements 8.3.5, 8.3.6, 8.3.7, & 8.3.9: These requirements cover initial password reset after first login, minimum password length, restricted use of previously used passwords, and password rotations, respectively.
Organizations must ensure that passwords used for application and system accounts are not hard-coded into scripts, configuration or property files, or bespoke or custom source code. Instead, organizations should opt to use password vaults or other means of automated credential management and protection, including those offered by popular cloud service providers. This requirement aims to prevent unauthorized use of application and system accounts with escalated privileges, especially those with interactive login capabilities.
Additionally, organizations are required to enforce password complexity and password rotation frequencies as defined by their Targeted Risk Analysis (TRA). The TRA is one of the most sweeping and cumbersome future-dated changes to PCI DSS.
MFA must be implemented for all access to the cardholder data environment (CDE), including:
This may sound like second nature given the current cybersecurity landscape and existing PCI DSS requirements, including 8.4.1 and 8.4.3. However, it is important to note that these standing requirements only cover non-console CDE access for administrators, and remote access that could impact the security of the CDE, respectively. Requirement 8.4.2 can best be thought of as the next logical step from 8.4.1, in that all non-console access into the CDE requires MFA, irrespective of user or admin status and regardless of in-network or out-of-network connectivity.
It is now required that MFA system capabilities be assessed to ensure:
For many organizations, these items will already be satisfied by an off-the-shelf MFA system; however, your organization must still do its due diligence and ensure the above requirements are met.
Organizations with payment pages or portals are now required to enforce the security and integrity of their payment pages. Specifically, scripts loaded and executed in a consumer’s browser must be authorized and their integrity assured. Additionally, an inventory of relevant scripts must be maintained, along with justification as to why each is necessary.
Organizations must also implement a change- and tamper-detection mechanism on all payment pages that operates at least weekly (or periodically, as defined in their TRA). These are intended to alert personnel of unauthorized modifications to payment pages, including HTTP headers and script contents. Common methods of ensuring payment page security and integrity are:
With PCI DSS now on version 4.0.1, time is running out for organizations to ensure compliance with the new standards. If you are required to comply, you must implement these new requirements by March 31, 2025, regardless of the timing of your annual audits.
However, not all of the future-dated controls are applicable to all organizations. PCI DSS 4.0 also introduced a new, customized method of meeting the framework’s requirements that allows organizations to adjust their implementation process to fit their unique control environment. During a PCI DSS assessment, a Qualified Security Assessor (QSA) will validate that your customized controls meet PCI DSS requirements by reviewing your organization’s unique documented approach and developing a procedure for validating the controls.
Whether you’re just beginning your PCI DSS journey or preparing for the transition to 4.0.1, BARR Advisory can help you assess your current security posture, implement required controls, and ensure full compliance before the March deadline. Contact us today to get started.