PCI DSS 4.0: Key Authorization Updates

PCI DSS 4.0, effective April 1, 2024, with mandatory compliance by March 31, 2025, introduces major updates to secure payment authorization processes. These changes impact U.S. businesses handling cardholder data, including retailers, e-commerce platforms, and service providers. Key updates include:

  • Mandatory Multi-Factor Authentication (MFA): Required for all access to Cardholder Data Environments (CDE), including internal and external users.
  • Stronger Password Rules: Minimum 12-character passwords with alphanumeric combinations; stricter policies for service providers.
  • Sensitive Data Protections: Encryption for sensitive authentication data (SAD) and enhanced controls for remote access.
  • Account Reviews: Semiannual reviews for human and system accounts to prevent excessive privileges.

Non-compliance risks fines, legal issues, and reputational damage. Organizations must assess their systems, implement MFA, update policies, and coordinate with service providers to meet these requirements.

Major Authorization Changes in PCI DSS 4.0

PCI DSS 4.0 introduces 47 new requirements and transitions 51 best practices into mandatory controls, all of which must be implemented by March 31, 2025. These updates bring about significant changes to how U.S. merchants and service providers handle user authentication and protect sensitive payment data, marking one of the most extensive updates in the standard’s history.

Updated Multi-Factor Authentication (MFA) Requirements

One of the biggest updates is the expanded requirement for multi-factor authentication (MFA) across all components of the Cardholder Data Environment (CDE). Under Requirement 8.4.2, MFA is now mandatory for every user – whether employees, contractors, or vendors – accessing CDE components like cloud systems, on-premises setups, or remote environments. This applies to hosted systems, applications, network devices, workstations, servers, and endpoints, regardless of whether the access is internal or external.

To meet these requirements, MFA solutions must use phishing-resistant methods such as biometrics or hardware tokens and be capable of withstanding attacks like man-in-the-middle and replay attacks. Many organizations have underestimated the scope of these changes, making the implementation of updated MFA measures one of the most resource-intensive aspects of transitioning to PCI DSS 4.0.

New Password and Authentication Rules

In addition to MFA updates, the standard now enforces stricter password and authentication protocols. Under Requirement 8.3.6, passwords or passphrases used as an authentication factor must be at least 12 characters long and include a mix of alphabetic and numeric characters. These changes aim to reduce vulnerabilities to brute-force and phishing attacks. The new password rules will become mandatory after March 31, 2025.

Service providers face even more stringent requirements. If passwords are the sole authentication factor for customer access to cardholder data, they must either enforce password changes every 90 days or implement dynamic security posture analysis to detect compromised credentials in real time. Additionally, PCI DSS 4.0 prohibits storing passwords or passphrases in scripts or files that unauthorized personnel could access. To comply, merchants need to eliminate hardcoded passwords from their systems and explore passwordless authentication solutions, particularly for high-volume e-commerce platforms.

Account governance has also been tightened. Organizations are now required to review all human accounts and their privileges at least every six months. Application and system accounts must undergo risk-based reviews to identify excessive privileges and mitigate insider threats, ensuring a higher level of security as authorization systems grow more complex.

Sensitive Authentication Data (SAD) Handling Rules

PCI DSS 4.0 introduces stricter guidelines for handling sensitive authentication data (SAD), including full track data, card verification codes (CVV2), and PINs. Requirement 3.3.3 now mandates encryption for issuers storing SAD, a shift from previous versions where encryption was merely recommended. Organizations handling PANs (Primary Account Numbers) must render them unreadable using methods like one-way hashing, truncation, index tokens, or strong encryption. If disk encryption is used, it must be paired with an additional safeguard.

E-commerce platforms also need to ensure that certificates used for transmitting data over public networks remain valid and unrevoked. Automated certificate management tools can help maintain compliance in this area. The standard explicitly prohibits storing SAD after authorization, except in limited cases where secure deletion must follow once the data is no longer needed.

A new technical control under Requirement 3.4.2 requires entities using remote access technologies for the CDE to prevent actions like copying, printing, downloading, or relocating PAN during remote sessions. This represents a shift from relying solely on policies to implementing enforced technical mechanisms. Together, these updates establish a more secure, end-to-end approach to authorization under PCI DSS 4.0.

How to Implement the New Requirements

Impact on Payment Systems and Authorization Flows

Start by mapping out every payment channel where authorization occurs. This includes card-present POS terminals, mobile POS devices, e-commerce checkouts, virtual terminals, and backend systems like payment gateways, fraud tools, and order management platforms. Also, identify how various roles – like cashiers, call center staff, developers, and vendors – authenticate systems that impact the Cardholder Data Environment (CDE).

For card-present environments, PCI DSS 4.0 doesn’t alter how EMV card authorizations function at the terminal. Instead, it introduces changes to how staff and administrators access systems managing authorization traffic. Specifically, all non-console access to the CDE and all access to system components within the CDE now require multi-factor authentication (MFA). For example, store managers using POS management consoles or remote support tools must authenticate with MFA every time they log in.

E-commerce operations will need to adapt to stricter requirements around administrative access to web applications, password policies, and enhanced access logging. These updates impact areas like fraud rules, routing, and 3-D Secure settings. This means revising admin portals, deployment pipelines, and integrations tied to authorization processes. Additionally, ensure POS terminals are secured when unattended, eliminate shared logins for overrides or forced authorizations, and require documented approval for high-risk authorization exceptions.

Finally, confirm that your service providers are equipped to support these upgraded authorization measures.

Working with Service Providers

If you’re working with a provider like Secured Payments for in-person, integrated, or e-commerce processing, verify that their platforms enforce PCI DSS 4.0-compliant authentication practices. This includes dashboards, virtual terminals, and configuration portals that influence authorization processes. Request their latest PCI DSS 4.x Attestation of Compliance (AOC), service descriptions, and responsibility matrix to clarify who manages areas like MFA, encryption, logging, and sensitive authentication data handling.

Ensure the provider’s solutions support secure integration methods, such as hosted payment pages, tokenization, and encrypted card-present devices. These approaches help reduce your CDE while maintaining critical authorization features like AVS, CVV checks, and risk scoring. Schedule regular reviews with your provider to discuss security updates, incident response strategies, and any changes to authorization logic or routing. These ongoing reviews will help you stay aligned with PCI DSS updates and avoid compliance issues.

Once you’ve coordinated with your service provider, move forward with updating your internal authorization processes.

Steps to Update Authorization Processes

Using your channel mapping and provider evaluations as a foundation, follow these steps to align your authorization processes with PCI DSS 4.0 requirements:

  • Scope and map all payment channels and systems influencing authorization.
  • Conduct a gap assessment to compare your current authentication, access controls, sensitive authentication data (SAD) handling, and logging practices against the updated standards.
  • Prioritize remediation tasks based on risk and effort. This might include rolling out MFA, updating password policies to require 12+ characters, and adjusting access controls for POS systems or back-office environments.
  • Coordinate these changes with your processors, gateways, and service providers to ensure smooth implementation.

Plan updates carefully to avoid disrupting high-volume sales periods, especially in multi-store operations. Consider piloting MFA deployments in a few locations or brands first to address usability and performance issues before a broader rollout. This phased approach will help minimize disruptions ahead of the April 1, 2025 deadline.

Finally, update policies, procedures, and training for both frontline staff and administrators. Make PCI DSS 4.0 controls part of your routine operations by scheduling regular access reviews for all human and system accounts interacting with the CDE or authorization systems.

U.S.-Specific Compliance Considerations

Common Authorization Scenarios for U.S. Merchants

U.S. merchants typically encounter three primary types of authorization scenarios: card-present POS, e-commerce, and MOTO transactions. Each of these requires adherence to strict controls, including multi-factor authentication (MFA), controlled access to cardholder data environments (CDE), and strong protections for sensitive authentication data (SAD). For split tender transactions – where customers use a mix of payment methods like credit cards, gift cards, or cash – the credit card portion must be treated as a standard authorization and comply fully with PCI DSS 4.0 standards. Systems that store authorization results or primary account numbers (PAN) need to be part of the CDE and enforce MFA, encryption, and logging. In restaurant and hospitality settings, initial authorizations (pre-tip) and post-authorization adjustments should never store SAD, such as full track data or CVV2, after the authorization process is completed. Systems that handle tip adjustments after authorization must implement access controls, logging, and MFA.

Partial approvals, which are common in the U.S. with prepaid or debit cards, require careful management. Re-attempts or follow-up authorizations must comply with masking and SAD handling rules. Authorization logic should avoid exposing PAN in insecure logs or error messages, and all related systems must remain within the scope of the CDE. For MOTO transactions, applications handling PAN and authorization data must include strict access controls, logging, and safeguards to prevent screen-scraping or unauthorized copying of PAN, particularly when agents work remotely.

To simplify compliance, working with providers like Secured Payments can be beneficial. They offer tokenization and hosted payment solutions that reduce the CDE footprint while supporting essential authorization features, such as AVS, CVV checks, and risk scoring for USD transactions. These scenarios emphasize the importance of aligning operational practices with PCI DSS 4.0 to meet U.S. regulatory expectations.

Meeting U.S. Regulatory Requirements

Although PCI DSS 4.0 is not a legal mandate, it serves as a key standard for evaluating security practices, particularly in the context of state breach-notification laws when authorization data is compromised. Many states require merchants to quickly notify affected parties if unencrypted card data or related personal information is exposed. Regulators and legal systems often reference PCI DSS to assess the adequacy of a merchant’s security measures.

In the event of an authorization system breach, U.S. merchants must coordinate with card brands, acquiring banks, third-party service providers (TPSPs), and state regulators or attorneys general to meet the requirements of state breach-notification laws and card acceptance agreements. PCI DSS 4.0 highlights the importance of monitoring TPSPs, defining clear responsibilities, and promptly reviewing incident reports and remediation efforts – especially if a hosted gateway or processor is involved in a breach that impacts authorization data.

For organizations subject to the Gramm-Leach-Bliley Act (GLBA) or similar sector-specific regulations, PCI DSS 4.0’s controls around encryption, access, and logging provide a solid foundation for broader data protection requirements. However, these controls do not replace statutory obligations, such as specific notification timelines or regulator reporting requirements. U.S. merchants should ensure their incident response plans align with PCI DSS 4.0 standards for logging, forensic readiness, and TPSP coordination, while also addressing state-specific triggers and contractual notification requirements with acquiring banks and processors. This alignment reinforces the need for the rigorous authorization processes discussed earlier.

Next Steps for Compliance

Main Points to Remember

As of April 1, 2025, all new and updated PCI DSS 4.0 requirements become mandatory. This includes requiring multi-factor authentication (MFA) for all access to cardholder data environments (CDEs) and enforcing passwords that are at least 12 alphanumeric characters long. Additionally, service provider account passwords must be refreshed every 90 days, and semiannual reviews of account privileges are now required.

Another important update is the need for documented risk analyses for key security controls. This allows organizations to align their security measures with actual risks rather than applying blanket rules. For U.S. merchants, these changes may intersect with state breach-notification laws and card brand requirements. Non-compliance could lead to fines, legal issues, and loss of customer trust.

These updates set the stage for the actionable steps outlined below.

How to Prepare for Compliance

To align with these requirements, start by conducting a thorough scope assessment. Identify every system, application, network segment, and third-party service that handles cardholder data. U.S. merchants should perform this assessment annually, while third-party service providers need to review their scope every six months. From there, map out systems requiring MFA, update password policies to meet the 12-character minimum, and schedule semiannual reviews of account privileges.

MFA deployment is now non-negotiable for all CDE and remote access points. Consider using network segmentation or tokenization to reduce your PCI scope, which can simplify compliance efforts and lower costs. For web-based payment channels, implement strict controls for payment page scripts and use automated tools like web application firewalls to detect and prevent attacks.

Partnering with a specialized payment service provider can also make compliance more manageable. For example, Secured Payments offers integrated solutions, consulting services, and expert guidance tailored to U.S. merchants. Their team can assist with implementing MFA, updating payment infrastructure, and maintaining compliance. As they put it:

"We work with you to make payments less confusing, not more"

Finally, allocate resources for MFA deployment, security tools, and compliance audits. Schedule a Report on Compliance (ROC) assessment and conduct regular system audits with proactive monitoring. These steps will help ensure your authorization processes meet all current requirements, while also identifying and addressing potential gaps before they lead to compliance failures or security issues.

FAQs

What are the updated multi-factor authentication (MFA) requirements in PCI DSS 4.0?

Under PCI DSS 4.0, multi-factor authentication (MFA) is now mandatory for all access to the cardholder data environment (CDE), regardless of whether the connection is through remote or internal networks. In practice, this means anyone accessing sensitive systems must authenticate their identity using at least two distinct factors from the following categories:

  • Something you know: For example, a password or PIN.
  • Something you have: Such as a hardware token or an authentication app on a smartphone.
  • Something you are: Like a fingerprint or facial recognition.

This updated requirement adds extra layers of security, making it harder for unauthorized individuals to access sensitive payment data. To stay compliant with PCI DSS standards, businesses need to ensure their systems are properly configured to meet these stricter guidelines.

How do the new password requirements in PCI DSS 4.0 impact service providers?

The latest password requirements introduced in PCI DSS 4.0 emphasize more robust authentication methods, such as implementing multi-factor authentication (MFA) and tightening password management rules. These updates are designed to bolster security, but they might require service providers to modify their existing systems and workflows.

Although these changes strengthen defenses against unauthorized access, they could also introduce additional layers of complexity to daily operations and user routines. Service providers will need to carefully plan these updates to ensure they remain compliant while keeping disruptions for their users to a minimum.

What actions should businesses take to comply with PCI DSS 4.0 before the deadline?

To align with PCI DSS 4.0 compliance, businesses need to start by carefully examining the updated requirements and evaluating their existing authorization processes. Some critical actions include setting up multi-factor authentication, enforcing stringent access controls, and performing regular vulnerability scans to pinpoint and address potential security issues.

Equally important is maintaining detailed documentation of all compliance activities and updating systems and policies as needed. Planning ahead will help your business stay on track, meet the deadline, and uphold secure payment practices.

We start every new client interaction with an in-depth discovery call where we get to know each other