Prioritized Approach For PCI DSS v4 0
Prioritized Approach For PCI DSS v4 0
Prioritized Approach For PCI DSS v4 0
Approach to Pursue
PCI DSS Compliance
The Payment Card Industry Data Security Standard (PCI DSS) provides a baseline of technical and operational requirements,
organized into 12 principal requirements and detailed security requirements. PCI DSS has been developed to secure payment account
data that is stored, processed, and/or transmitted by merchants, service providers, and other organizations (referred to, collectively, as
“organizations” hereafter). By its comprehensive nature, PCI DSS provides a large amount of security information – so much
information that some people responsible for security of payment account data may wonder where to start. Toward this end, the PCI
Security Standards Council provides the Prioritized Approach to help organizations understand how they can reduce risk earlier in their
PCI DSS journey.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
1
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Disclaimer
This document does not modify or abridge the PCI DSS or any of its requirements and may
be changed without notice.
PCI SSC is not responsible for errors or damages of any kind resulting from the use of the
information contained herein. PCI SSC makes no warranty, guarantee, or representation
whatsoever regarding the information provided herein, and assumes no responsibility or
liability regarding the use or misuse of such information.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
2
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
1.1 Processes and mechanisms for installing and maintaining network security
controls are defined and understood.
1.1.1 All security policies and operational procedures that are identified in 6
Requirement 1 are:
• Documented.
• Kept up to date.
• In use.
• Known to all affected parties.
1.2.5 All services, protocols, and ports allowed are identified, approved, and 2
have a defined business need.
1.2.6 Security features are defined and implemented for all services, 2
protocols, and ports that are in use and considered to be insecure, such that
the risk is mitigated.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
3
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
1.2.7 Configurations of NSCs are reviewed at least once every six months 6
to confirm they are relevant and effective.
1.3 Network access to and from the cardholder data environment is restricted.
1.3.3 NSCs are installed between all wireless networks and the CDE, 2
regardless of whether the wireless network is a CDE, such that:
• All wireless traffic from wireless networks into the CDE is denied by
default.
• Only wireless traffic with an authorized business purpose is allowed into
the CDE.
1.4 Network connections between trusted and untrusted networks are controlled.
1.4.4 System components that store cardholder data are not directly 2
accessible from untrusted networks.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
4
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
1.5 Risks to the CDE from computing devices that are able to connect to both
untrusted networks and the CDE are mitigated.
2.1 Processes and mechanisms for applying secure configurations to all system
components are defined and understood.
2.1.1 All security policies and operational procedures that are identified in 6
Requirement 2 are:
• Documented.
• Kept up to date.
• In use.
• Known to all affected parties.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
5
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
6
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
3.1 Processes and mechanisms for protecting stored account data are defined
and understood.
3.1.1 All security policies and operational procedures that are identified in 6
Requirement 3 are:
• Documented.
• Kept up to date.
• In use.
• Known to all affected parties.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
7
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
3.3.1 SAD is not retained after authorization, even if encrypted. All sensitive 1
authentication data received is rendered unrecoverable upon completion of
the authorization process.
3.3.1.1 The full contents of any track are not retained upon completion 1
of the authorization process.
3.3.1.2 The card verification code is not retained upon completion of the 1
authorization process.
3.3.1.3 The personal identification number (PIN) and the PIN block are 1
not retained upon completion of the authorization process.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
8
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
3.4 Access to displays of full PAN and ability to copy PAN is restricted.
3.4.1 PAN is masked when displayed (the BIN and last four digits are the 5
maximum number of digits to be displayed), such that only personnel with
a legitimate business need can see more than the BIN and last four digits
of the PAN.
3.5.1.1 Hashes used to render PAN unreadable (per the first bullet of 5
Requirement 3.5.1) are keyed cryptographic hashes of the entire PAN,
with associated key-management processes and procedures in
accordance with Requirements 3.6 and 3.7.
This requirement is a best practice until 31 March 2025; refer to
Applicability Notes in PCI DSS for details.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
9
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
3.6 Cryptographic keys used to protect stored account data are secured.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
10
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
3.7 Where cryptography is used to protect stored account data, key management
processes and procedures covering all aspects of the key lifecycle are defined
and implemented.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
11
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
4.1 Processes and mechanisms for protecting cardholder data with strong
cryptography during transmission over open, public networks are defined and
documented.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
12
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
4.1.1 All security policies and operational procedures that are identified in 6
Requirement 4 are:
• Documented.
• Kept up to date.
• In use.
• Known to all affected parties.
4.2.2 PAN is secured with strong cryptography whenever it is sent via end- 2
user messaging technologies.
5.1 Processes and mechanisms for protecting all systems and networks from
malicious software are defined and understood.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
13
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
5.1.1 All security policies and operational procedures that are identified in 6
Requirement 5 are:
• Documented.
• Kept up to date.
• In use.
• Known to all affected parties.
5.2.3 Any system components that are not at risk for malware are evaluated 2
periodically to include the following:
• A documented list of all system components not at risk for malware.
• Identification and evaluation of evolving malware threats for those
system components.
• Confirmation whether such system components continue to not require
anti-malware protection.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
14
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
5.3.4 Audit logs for the anti-malware solution(s) are enabled and retained in 2
accordance with Requirement 10.5.1.
6.1 Processes and mechanisms for developing and maintaining secure systems
and software are defined and understood.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
15
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
6.1.1 All security policies and operational procedures that are identified in 6
Requirement 6 are:
• Documented.
• Kept up to date.
• In use.
• Known to all affected parties.
6.2.3 Bespoke and custom software is reviewed prior to being released into 3
production or to customers, to identify and correct potential coding
vulnerabilities, as follows:
• Code reviews ensure code is developed according to secure coding
guidelines.
• Code reviews look for both existing and emerging software
vulnerabilities.
• Appropriate corrections are implemented prior to release.
6.2.3.1 If manual code reviews are performed for bespoke and custom 3
software prior to release to production, code changes are:
• Reviewed by individuals other than the originating code author, and
who are knowledgeable about code-review techniques and secure
coding practices.
• Reviewed and approved by management prior to release.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
16
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
17
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
6.4.1 For public-facing web applications, new threats and vulnerabilities are 3
addressed on an ongoing basis and these applications are protected
against known attacks as follows:
• Reviewing public-facing web applications via manual or automated
application vulnerability security assessment tools or methods as follows:
– At least once every 12 months and after significant changes.
– By an entity that specializes in application security.
– Including, at a minimum, all common software attacks in Requirement
6.2.4.
– All vulnerabilities are ranked in accordance with requirement 6.3.1.
– All vulnerabilities are corrected.
– The application is re-evaluated after the corrections
OR
• Installing an automated technical solution(s) that continually detects and
prevents web-based attacks as follows:
– Installed in front of public-facing web applications to detect and
prevent web-based attacks.
– Actively running and up to date as applicable.
– Generating audit logs.
– Configured to either block web-based attacks or generate an alert
that is immediately investigated.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
18
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
6.4.3 All payment page scripts that are loaded and executed in the 2
consumer’s browser are managed as follows:
• A method is implemented to confirm that each script is authorized.
• A method is implemented to assure the integrity of each script.
• An inventory of all scripts is maintained with written justification as to why
each is necessary.
This requirement is a best practice until 31 March 2025; refer to Applicability
Notes in PCI DSS for details.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
19
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
6.5.4 Roles and functions are separated between production and pre- 3
production environments to provide accountability such that only reviewed
and approved changes are deployed.
6.5.5 Live PANs are not used in pre-production environments, except where 3
those environments are included in the CDE and protected in accordance
with all applicable PCI DSS requirements.
6.5.6 Test data and test accounts are removed from system components 3
before the system goes into production.
7.1 Processes and mechanisms for restricting access to system components and
cardholder data by business need to know are defined and understood.
7.1.1 All security policies and operational procedures that are identified in 6
Requirement 7 are:
• Documented.
• Kept up to date.
• In use.
• Known to all affected parties.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
20
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
7.2.4 All user accounts and related access privileges, including third- 4
party/vendor accounts, are reviewed as follows:
• At least once every six months.
• To ensure user accounts and access remain appropriate based on job
function.
• Any inappropriate access is addressed.
• Management acknowledges that access remains appropriate.
This requirement is a best practice until 31 March 2025; refer to Applicability
Notes in PCI DSS for details.
7.2.5 All application and system accounts and related access privileges are 4
assigned and managed as follows:
• Based on the least privileges necessary for the operability of the system
or application.
• Access is limited to the systems, applications, or processes that
specifically require their use.
This requirement is a best practice until 31 March 2025; refer to Applicability
Notes in PCI DSS for details.
7.3 Access to system components and data is managed via an access control
system(s).
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
21
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
Requirement 8:
8.1 Processes and mechanisms for identifying users and authenticating access to
system components are defined and understood.
8.1.1 All security policies and operational procedures that are identified in 6
Requirement 8 are:
• Documented.
• Kept up to date.
• In use.
• Known to all affected parties.
8.2 User identification and related accounts for users and administrators are
strictly managed throughout an account’s lifecycle.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
22
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
8.2.8 If a user session has been idle for more than 15 minutes, the user is 2
required to re-authenticate to re-activate the terminal or session.
8.3.1 All user access to system components for users and administrators is 2
authenticated via at least one of the following authentication factors:
• Something you know, such as a password or passphrase.
• Something you have, such as a token device or smart card.
• Something you are, such as a biometric element.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
23
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
24
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
8.4.1 MFA is implemented for all non-console access into the CDE for 2
personnel with administrative access.
8.4.3 MFA is implemented for all remote network access originating from 2
outside the entity’s network that could access or impact the CDE as follows:
• All remote access by all personnel, both users and administrators,
originating from outside the entity’s network.
• All remote access by third parties and vendors.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
25
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
8.6 Use of application and system accounts and associated authentication factors
is strictly managed.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
26
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
9.1 Processes and mechanisms for restricting physical access to cardholder data
are defined and understood.
9.1.1 All security policies and operational procedures that are identified in 6
Requirement 9 are:
• Documented.
• Kept up to date.
• In use.
• Known to all affected parties.
9.2 Physical access controls manage entry into facilities and systems containing
cardholder data.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
27
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
9.3 Physical access for personnel and visitors is authorized and managed.
9.3.1.1 Physical access to sensitive areas within the CDE for personnel 2
is controlled as follows:
• Access is authorized and based on individual job function.
• Access is revoked immediately upon termination.
• All physical access mechanisms, such as keys, access cards, etc.,
are returned or disabled upon termination.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
28
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
9.4 Media with cardholder data is securely stored, accessed, distributed, and
destroyed.
9.4.2 All media with cardholder data is classified in accordance with the 5
sensitivity of the data.
9.4.3 Media with cardholder data sent outside the facility is secured as 5
follows:
• Media sent outside the facility is logged.
• Media is sent by secured courier or other delivery method that can be
accurately tracked.
• Offsite tracking logs include details about media location.
9.4.4 Management approves all media with cardholder data that is moved 5
outside the facility (including when media is distributed to individuals).
9.4.5 Inventory logs of all electronic media with cardholder data are 5
maintained.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
29
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
9.5.1 POI devices that capture payment card data via direct physical 2
interaction with the payment card form factor are protected from tampering
and unauthorized substitution, including the following:
• Maintaining a list of POI devices.
• Periodically inspecting POI devices to look for tampering or
unauthorized substitution.
• Training personnel to be aware of suspicious behavior and to report
tampering or unauthorized substitution of devices.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
30
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
Requirement 10: Log and Monitor All Access to System Components and Cardholder Data
10.1 Processes and mechanisms for logging and monitoring all access to system
components and cardholder data are defined and documented.
10.1.1 All security policies and operational procedures that are identified in 6
Requirement 10 are:
• Documented.
• Kept up to date.
• In use.
• Known to all affected parties.
10.2 Audit logs are implemented to support the detection of anomalies and 4
suspicious activity, and the forensic analysis of events.
10.2.1 Audit logs are enabled and active for all system components and 4
cardholder data.
10.2.1.2 Audit logs capture all actions taken by any individual with 4
administrative access, including any interactive use of application or
system accounts.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
31
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
10.2.2 Audit logs record the following details for each auditable event: 4
• User identification.
• Type of event.
• Date and time.
• Success and failure indication.
• Origination of event.
• Identity or name of affected data, system component, resource, or
service (for example, name and protocol).
10.3 Audit logs are protected from destruction and unauthorized modifications.
10.3.1 Read access to audit logs files is limited to those with a job-related 4
need.
10.3.3 Audit log files, including those for external-facing technologies, are 4
promptly backed up to a secure, central, internal log server(s) or other
media that is difficult to modify.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
32
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
10.4.1 The following audit logs are reviewed at least once daily: 4
• All security events.
• Logs of all system components that store, process, or transmit CHD
and/or SAD.
• Logs of all critical system components.
• Logs of all servers and system components that perform security
functions (for example, network security controls, intrusion-detection
systems/intrusion-prevention systems (IDS/IPS), authentication servers).
10.4.2.1 The frequency of periodic log reviews for all other system 4
components (not defined in Requirement 10.4.1) is defined in the
entity’s targeted risk analysis, which is performed according to all
elements specified in Requirement 12.3.1.
This requirement is a best practice until 31 March 2025; refer to
Applicability Notes in PCI DSS for details.
10.4.3 Exceptions and anomalies identified during the review process are 4
addressed.
10.5.1 Retain audit log history for at least 12 months, with at least the most 4
recent three months immediately available for analysis.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
33
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
10.6.2 Systems are configured to the correct and consistent time as follows: 4
• One or more designated time servers are in use.
• Only the designated central time server(s) receives time from external
sources.
• Time received from external sources is based on International Atomic
Time or Coordinated Universal Time (UTC).
• The designated time server(s) accept time updates only from specific
industry-accepted external sources.
• Where there is more than one designated time server, the time servers
peer with one another to keep accurate time.
• Internal systems receive time information only from designated central
time server(s).
10.7 Failures of critical security control systems are detected, reported, and
responded to promptly.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
34
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
10.7.2 Failures of critical security control systems are detected, alerted, and 4
addressed promptly, including but not limited to failure of the following
critical security control systems:
• Network security controls.
• IDS/IPS.
• Change-detection mechanisms.
• Anti-malware solutions.
• Physical access controls.
• Logical access controls.
• Audit logging mechanisms.
• Segmentation controls (if used).
• Audit log review mechanisms.
• Automated security testing tools (if used).
This requirement is a best practice until 31 March 2025; refer to Applicability
Notes in PCI DSS for details.
11.1 Processes and mechanisms for regularly testing security of systems and
networks are defined and understood.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
35
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
11.1.1 All security policies and operational procedures that are identified in 6
Requirement 11 are:
• Documented.
• Kept up to date.
• In use.
• Known to all affected parties.
11.2 Wireless access points are identified and monitored, and unauthorized
wireless access points are addressed.
11.3 External and internal vulnerabilities are regularly identified, prioritized, and
addressed.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
36
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
37
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
38
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
39
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
11.5 Network intrusions and unexpected file changes are detected and
responded to.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
40
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
11.6 Unauthorized changes on payment pages are detected and responded to.
Requirement 12: Support Information Security with Organizational Policies and Programs
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
41
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
12.1.3 The security policy clearly defines information security roles and 6
responsibilities for all personnel, and all personnel are aware of and
acknowledge their information security responsibilities.
12.2 Acceptable use policies for end-user technologies are defined and
implemented.
12.3 Risks to the cardholder data environment are formally identified, evaluated,
and managed.
12.3.1 Each PCI DSS requirement that provides flexibility for how frequently 2
it is performed (for example, requirements to be performed periodically) is
supported by a targeted risk analysis that is documented and includes:
• Identification of the assets being protected.
• Identification of the threat(s) that the requirement is protecting against.
• Identification of factors that contribute to the likelihood and/or impact of a
threat being realized.
• Resulting analysis that determines, and includes justification for, how
frequently the requirement must be performed to minimize the likelihood
of the threat being realized.
• Review of each targeted risk analysis at least once every 12 months to
determine whether the results are still valid or if an updated risk analysis
is needed.
• Performance of updated risk analyses when needed, as determined by
the annual review.
This requirement is a best practice until 31 March 2025; refer to Applicability
Notes in PCI DSS for details.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
42
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
12.3.2 A targeted risk analysis is performed for each PCI DSS requirement 2
that the entity meets with the customized approach, to include:
• Documented evidence detailing each element specified in Appendix D:
Customized Approach (including, at a minimum, a controls matrix and
risk analysis).
• Approval of documented evidence by senior management.
• Performance of the targeted analysis of risk at least once every 12
months.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
43
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
12.5.1 An inventory of system components that are in scope for PCI DSS, 2
including a description of function/use, is maintained and kept current.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
44
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
12.5.2 PCI DSS scope is documented and confirmed by the entity at least 1
once every 12 months and upon significant change to the in-scope
environment. At a minimum, the scoping validation includes:
• Identifying all data flows for the various payment stages (for example,
authorization, capture settlement, chargebacks, and refunds) and
acceptance channels (for example, card-present, card-not-present, and
e-commerce).
• Updating all data-flow diagrams per Requirement 1.2.4.
• Identifying all locations where account data is stored, processed, and
transmitted, including but not limited to: 1) any locations outside of the
currently defined CDE, 2) applications that process CHD, 3)
transmissions between systems and networks, and 4) file backups.
• Identifying all system components in the CDE, connected to the CDE, or
that could impact security of the CDE.
• Identifying all segmentation controls in use and the environment(s) from
which the CDE is segmented, including justification for environments
being out of scope.
• Identifying all connections from third-party entities with access to the
CDE.
• Confirming that all identified data flows, account data, system
components, segmentation controls, and connections from third parties
with access to the CDE are included in scope.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
45
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
12.7.1 Potential personnel who will have access to the CDE are screened, 6
within the constraints of local laws, prior to hire to minimize the risk of
attacks from internal sources.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
46
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
12.8.1 A list of all third-party service providers (TPSPs) with which account 2
data is shared or that could affect the security of account data is
maintained, including a description for each of the services provided.
12.9 Third-party service providers (TPSPs) support their customers’ PCI DSS
compliance.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
47
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
12.10 Suspected and confirmed security incidents that could impact the CDE are
responded to immediately.
12.10.2 At least once every 12 months, the security incident response plan 2
is:
• Reviewed and the content is updated as needed.
• Tested, including all elements listed in Requirement 12.10.1.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
48
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
Appendix A1: Additional PCI DSS Requirements for Multi-Tenant Service Providers
A1.1.2 Controls are implemented such that each customer only has 4
permission to access its own cardholder data and CDE.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
49
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
A1.1.3 Controls are implemented such that each customer can only access 4
resources allocated to them.
A1.2 Multi-tenant service providers facilitate logging and incident response for all
customers.
A1.2.1 Audit log capability is enabled for each customer’s environment that 4
is consistent with PCI DSS Requirement 10, including:
• Logs are enabled for common third-party applications.
• Logs are active by default.
• Logs are available for review only by the owning customer.
• Log locations are clearly communicated to the owning customer.
• Log data and availability is consistent with PCI DSS Requirement 10.
Appendix A2: Additional PCI DSS Requirements for Entities Using SSL/Early TLS for Card-
Present POS POI Terminal Connections
A2.1 POI terminals using SSL and/or early TLS are confirmed as not susceptible
to known SSL/TLS exploits.
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
50
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022
The Prioritized Approach to Pursue PCI DSS Compliance
Milestone
PCI DSS Requirements v4.0
1 2 3 4 5 6
©2016 – 2022 PCI Security Standards Council LLC. The intent of this document is to provide
51
supplemental information, which does not replace or supersede requirements in any PCI SSC Standard.
August 2022