Valtik Studios
Free Resource · PCI DSS 4.0

PCI DSS 4.0 Requirements Map

All 12 requirement families with 2026 enforcement notes and the specific items biting merchants hardest since the March 2025 mandate.

Goal 1: Build and Maintain a Secure Network and Systems

Requirement 1: Install and Maintain Network Security Controls

  • 1.2 — Network security controls configuration and maintenance
  • 1.3 — Network access to/from CDE restricted
  • 1.4 — Network connections between trusted and untrusted networks controlled
  • 1.5 — Risks to CDE from computing devices that connect to both untrusted networks and CDE mitigated

Requirement 2: Apply Secure Configurations to All System Components

  • 2.2 — System components configured securely
  • 2.3 — Wireless environments configured securely (includes vendor defaults)

Goal 2: Protect Account Data

Requirement 3: Protect Stored Account Data

  • 3.2 — Account data storage minimized
  • 3.3 — Sensitive authentication data not stored after authorization
  • 3.4 — Primary Account Number display masked
  • 3.5 — PAN made unreadable wherever stored (encryption, hashing, truncation, tokenization)
  • 3.6 — Cryptographic keys protected
  • 3.7 — Key management procedures

Requirement 4: Protect Cardholder Data with Strong Cryptography During Transmission

  • 4.2 — PAN protected with strong cryptography during transmission over open public networks

Goal 3: Maintain a Vulnerability Management Program

Requirement 5: Protect All Systems Against Malware

  • 5.2 — Malicious software prevented or detected
  • 5.3 — Anti-malware mechanisms active, maintained, and monitored
  • 5.4 — Anti-phishing mechanisms (workforce-facing)

Requirement 6: Develop and Maintain Secure Systems and Software

  • 6.2 — Bespoke and custom software developed securely
  • 6.3 — Security vulnerabilities identified and addressed
  • 6.4.3 (2026 enforcement) — Payment page scripts inventoried, justified, and authorized
  • 6.5 — Changes to system components managed securely

Goal 4: Implement Strong Access Control Measures

Requirement 7: Restrict Access by Business Need-to-Know

  • 7.2 — Access to system components and data defined and assigned
  • 7.3 — Access controls managed via access control system

Requirement 8: Identify Users and Authenticate Access

  • 8.2 — User identification managed throughout the account lifecycle
  • 8.3 — Strong authentication established; MFA required for all non-console admin access and all remote access to CDE
  • 8.4 — MFA implemented to secure non-console admin access
  • 8.5 — MFA systems configured to prevent misuse
  • 8.6 — Authentication for applications, scripts, and services

Requirement 9: Restrict Physical Access to Cardholder Data

  • 9.2 — Physical access controls
  • 9.3 — Personnel authorization and access to CDE managed
  • 9.4 — Media security
  • 9.5 — POI device security (for card-present merchants)

Goal 5: Regularly Monitor and Test Networks

Requirement 10: Log and Monitor All Access

  • 10.2 — Audit logs capture relevant events
  • 10.3 — Audit logs protected from destruction and unauthorized modification
  • 10.4 — Audit logs reviewed to identify anomalies or suspicious activity
  • 10.5 — Audit log history retained
  • 10.6 — Time-synchronization mechanisms
  • 10.7 — Failures of critical security control systems detected, reported, and responded to

Requirement 11: Test Security of Systems and Networks Regularly

  • 11.2 — Wireless access points identified and managed
  • 11.3 — External and internal vulnerabilities identified and managed (quarterly ASV scans)
  • 11.4 — Penetration testing performed regularly (annual internal + external, plus after significant change; segmentation testing annual/semi-annual)
  • 11.5 — Intrusion detection or prevention monitoring
  • 11.6.1 (2026 enforcement) — Payment page script changes detected and alerted

Goal 6: Maintain an Information Security Policy

Requirement 12: Support Information Security with Organizational Policies and Programs

  • 12.2 — Acceptable use policies
  • 12.3 — Risks to cardholder data environment formally managed
  • 12.4 — Compliance monitoring
  • 12.5 — PCI DSS scope documented and validated
  • 12.6 — Security awareness program
  • 12.7 — Personnel screened
  • 12.8 — Third-party service provider risk managed
  • 12.9 — Third-party service providers acknowledge responsibility
  • 12.10 — Suspected and confirmed security incidents responded to immediately

2026 biting points

Since the March 2025 mandate, the requirements catching merchants most often:

  • 6.4.3 and 11.6.1 — payment page script inventory and change detection. Most merchants had never audited the third-party scripts on their checkout pages before. Implementation options: Content Security Policy, Subresource Integrity, or commercial tools (Feroot DomainGuard, Human Security).
  • 8.3 phishing-resistant MFA — SMS is out. TOTP at minimum. FIDO2/passkeys preferred for admin access.
  • 11.4 penetration testing — annual internal + external. Merchants with only quarterly ASV scans are failing.
  • 12.8 third-party service provider risk — formal vendor risk management, not just "we have a contract."
Merchant vs service provider — service provider requirements are stricter. If you store, process, or transmit cardholder data on behalf of another merchant, you are a service provider and segmentation testing is semi-annual (not annual), penetration testing requirements are stricter, and formal PCI DSS attestation (AOC) is expected.

Related resources

Ready to start?

Free website security check — no obligation, no sales pitch. Delivered as a plain-English findings report in 48 hours.

Request Free Check