Prioritized Approach Tool For PCI DSS v4 0 r1
Prioritized Approach Tool For PCI DSS v4 0 r1
Purpose: Tool for tracking progress toward compliance with PCI DSS version 4.0 by using
the Prioritized Approach. Also provides a sorting tool to analyze progress by PCI DSS
requirement, milestone category, or milestone status.
Step 1: Please indicate "Yes", "No", or "N/A" in Column C of the “Prioritized Approach
Milestones” spreadsheet tab. This step will auto-populate the “percentage complete” fields
on the “Prioritized Approach Summary” spreadsheet tab.
Step 3: Complete the Organization Information on the "Prioritized Approach Summary" tab.
You may share this document with your acquirer or Qualified Security Assessor to provide
an assessment of progress your organization has completed toward PCI DSS compliance.
You may also manually enter an estimated completion date for each milestone phase.
Check with your acquirer for specific submission instructions.
Step 4: When you get to reach 100% for all of the requirement listed in the milestones
category, talk to your acquirer or the payment brands about the next steps. Questions
about using the Prioritized Approach and how use of the Prioritized Approach may impact
an organization’s compliance obligations should be directed to your acquirer or the
payment brands to which your organization reports compliance.
PCI Security Standards Council® Prioritized Approach for PCI DSS v4.0 r1
Disclaimer: This document does not modify or abridge the PCI DSS or any of its requirements and
may be changed without notice. PCI SSC is not responsible for errors or damages of any kind
resulting from the use of the information contained therein. PCI SSC makes no warranty, guarantee,
or representation as to the accuracy or sufficiency of the information provided as part of the
Prioritized Approach, and PCI SSC assumes no responsibility or liability regarding the use or misuse
of such information.
PCI Security Standards Council® Prioritized Approach for PCI DSS v4.0 r1
PCI DSS v4.0 - Prioritized Approach Tool r1
Change Summary
February 2023
Document Changes
August 2022 Prioritized Approach Tool Initial release for PCI DSS v4.0
PCI DSS v4.0
PCI Security Standards Council® Prioritized Approach for PCI DSS v4.0 r1
Prioritized Approach Summary & Acknowledgment
Part 1: Contact Information
Company Name Company Mailing Address
DBA (Doing Business As) Company Main Website
Company Contact Name
Company Contact Title
Contact Phone Number
Contact Email Address
Part 2a: Merchant Business Channels (Select all that apply) Part 2b: Service Provider Business (Select all that apply)
Mail order/telephone order (MOTO) Hosting Provider: Managed Services: Payment Processing:
E-Commerce Applications / software Systems security services POI / card present
Card-present Hardware IT support Internet / e-commerce
Other processing (specify): Infrastructure / Network Physical security MOTO / Call Center
Physical space (co-location) Terminal Management Sys ATM
Part 3: Relationships Storage Other services (specify): Other processing (specify):
Does your organization have a relationship with one or more third-party agents? Web-hosting services
(Ex: gateways, web-hosting companies, airline booking agents, loyalty program agents, etc)? Security services
3-D Secure Hosting Provider
Multi-Tenant Service Provider
DoesYyour organization have a relationship with more than one acquirer? Other Hosting (specify):
e
s
Account Management Fraud and Chargeback Payment Gateway/Switch
Back-Office Services Issuer Processing Prepaid Services
Billing Management Loyalty Programs Records Management
Clearing and Settlement Merchant Services Tax/Government Payments
Network Provider
Others (specify):
Part 4: Transaction Processing
Payment Application in use List facilities and locations included in PCI DSS Assessment:
Payment Application Version
Questions about use of the PCI DSS Prioritized Approach and its impacts on an organzition's PCI DSS compliance obligations should be directed to your acquirer or the payment brand(s). Prioritized Approach for PCI DSS v4.0 r1
Prioritized Approach Summary & Acknowledgment
Protect stored cardholder data. For those organizations that have analyzed their business
5 processes and determined that they must store Primary Account Numbers, this milestone targets key 0.0%
protection mechanisms for the stored data.
Complete remaining compliance efforts, and ensure all controls are in place. This milestone
6 completes PCI DSS requirements and finishes all remaining related policies, procedures, and processes
needed to protect the cardholder data environment.
0.0%
Overall 0.0%
An organization submitting this form may be required to complete an Action Plan, located in each Attestation of Compliance in Part 4: Action Plan for Non-Compliant
Requirements. Check with your acquirer or the payment brand(s), since not all payment brands require completion of an Action Plan.
The Prioritized Approach tool is provided to assist organizations seeking to achieve compliance, but it does not, and is not intended in any manner to, modify or abridge PCI DSS or any of its requirements.
Part 5: Target Date for Achieving Full PCI DSS Compliance Date (YYYY-MM-DD)
Questions about use of the PCI DSS Prioritized Approach and its impacts on an organzition's PCI DSS compliance obligations should be directed to your acquirer or the payment brand(s). Prioritized Approach for PCI DSS v4.0 r1
PCI DSS v4.0 - Prioritized Approach Tool r1
1.2.5 All services, protocols and ports allowed are identified, approved, and have
a defined business need. 2
1.2.6 Security features are defined and implemented for all services, protocols,
and ports that are in use and considered to be insecure, such that the risk is 2
mitigated.
1.2.7 Configurations of NSCs are reviewed at least once every six months to
confirm they are relevant and effective. 6
PCI Security Standards Council® 6 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
1.3.3 NSCs are installed between all wireless networks and the CDE, regardless of
whether the wireless network is a CDE, such that:
• All wireless traffic from wireless networks into the CDE is denied by default. 2
• Only wireless traffic with an authorized business purpose is allowed into the
CDE.
1.4 Network connections between trusted and untrusted networks are
controlled.
1.4.1 NSCs are implemented between trusted and untrusted networks. 2
1.4.2 Inbound traffic from untrusted networks to trusted networks is restricted to:
• Communications with system components that are authorized to provide
publicly accessible services, protocols, and ports.
• Stateful responses to communications initiated by system components in a
trusted network.
• All other traffic is denied.
Applicability Notes 2
The intent of this requirement is to address communication sessions between
trusted and untrusted networks, rather than the specifics of protocols.
This requirement does not limit the use of UDP or other connectionless network
protocols if state is maintained by the NSC.
1.4.3 Anti-spoofing measures are implemented to detect and block forged source
IP addresses from entering the trusted network. 2
1.4.4 System components that store cardholder data are not directly accessible
from untrusted networks.
Applicability Notes
This requirement is not intended to apply to storage of account data in volatile
memory but does apply where memory is being treated as persistent storage (for 2
example, RAM disk). Account data can only be stored in volatile memory during
the time necessary to support the associated business process (for example, until
completion of the related payment card transaction).
1.5 Risks to the CDE from computing devices that are able to connect to
both untrusted networks and the CDE are mitigated.
PCI Security Standards Council® 7 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
PCI Security Standards Council® 8 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
2.2.3 Primary functions requiring different security levels are managed as follows:
• Only one primary function exists on a system component,
OR
• Primary functions with differing security levels that exist on the same system
component are isolated from each other, 2
OR
• Primary functions with differing security levels on the same system
component are all secured to the level required by the function with the highest
security need.
2.2.4 Only necessary services, protocols, daemons, and functions are enabled,
and all unnecessary functionality is removed or disabled. 2
2.2.5 If any insecure services, protocols, or daemons are present:
• Business justification is documented.
• Additional security features are documented and implemented that reduce 2
the risk of using insecure services, protocols, or daemons.
PCI Security Standards Council® 9 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
3.3.1 SAD is not retained after authorization, even if encrypted. All sensitive
authentication data received is rendered unrecoverable upon completion of the
authorization process
Applicability Notes
This requirement does not apply to issuers and companies that support issuing 1
services (where SAD is needed for a legitimate issuing business need) and have a
business justification to store the sensitive authentication data.
Refer to Requirement 3.3.3 for additional requirements specifically for issuers.
Sensitive authentication data includes the data cited in Requirements 3.3.1.1
through 3.3.1.3.
3.3.1.1 The full contents of any track are not retained upon completion of the
authorization process.
Applicability Notes
In the normal course of business, the following data elements from the track may
need to be retained:
• Cardholder name. 1
• Primary account number (PAN).
• Expiration date.
• Service code.
To minimize risk, store securely only these data elements as needed for business.
3.3.1.2 The card verification code is not retained upon completion of the
authorization process.
Applicability Notes
The card verification code is the three- or four-digit number printed on the front or 1
back of a payment card used to verify card-not-present transactions.
PCI Security Standards Council® 10 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
3.3.1.3 The personal identification number (PIN) and the PIN block are not
retained upon completion of the authorization process.
Applicability Notes
PIN blocks are encrypted during the natural course of transaction processes, but 1
even if an entity encrypts the PIN block again, it is still not allowed to be stored
after the completion of the authorization process.
3.3.3 Additional requirement for issuers and companies that support issuing
services and store sensitive authentication data: Any storage of sensitive
authentication data is:
• Limited to that which is needed for a legitimate issuing business need and is
secured.
• Encrypted using strong cryptography.
Applicability Notes
This requirement applies only to issuers and companies that support issuing
services and store sensitive authentication data.
Entities that issue payment cards or that perform or support issuing services will
often create and control sensitive authentication data as part of the issuing
function. It is allowable for companies that perform, facilitate, or support issuing
services to store sensitive authentication data ONLY IF they have a legitimate
business need to store such data.
PCI DSS requirements are intended for all entities that store, process, or transmit 1
account data, including issuers. The only exception for issuers and issuer
processors is that sensitive authentication data may be retained if there is a
legitimate reason to do so. Any such data must be stored securely and in
accordance with all PCI DSS and specific payment brand requirements.
(continued on next page)
The bullet above (for encrypting stored SAD with strong cryptography) is a best
practice until 31 March 2025, after which it will be required as part of Requirement
3.3.3 and must be fully considered during a PCI DSS assessment.
3.4 Access to displays of full PAN and ability to copy account data is
restricted.
PCI Security Standards Council® 11 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
3.4.1 PAN is masked when displayed (the BIN and last four digits are the
maximum number of digits to be displayed), such that only personnel with a
legitimate business need can see more than the BIN and last four digits of the
PAN.
Applicability Notes
This requirement does not supersede stricter requirements in place for displays of
cardholder data—for example, legal or payment brand requirements for point-of- 5
sale (POS) receipts.
This requirement relates to protection of PAN where it is displayed on screens,
paper receipts, printouts, etc., and is not to be confused with Requirement 3.5.1
for protection of PAN when stored, processed, or transmitted.
PCI Security Standards Council® 12 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
3.6 Cryptographic keys used to protect stored account data are secured.
3.6.1 Procedures are defined and implemented to protect cryptographic keys used
to protect stored account data against disclosure and misuse that include:
• Access to keys is restricted to the fewest number of custodians
necessary.
• Key-encrypting keys are at least as strong as the data-encrypting keys
they protect.
• Key-encrypting keys are stored separately from data-encrypting keys.
• Keys are stored securely in the fewest possible locations and forms.
Applicability Notes 5
This requirement applies to keys used to encrypt stored account data and to key-
encrypting keys used to protect data-encrypting keys.
The requirement to protect keys used to protect stored account data from
disclosure and misuse applies to both data-encrypting keys and key-encrypting
keys. Because one key-encrypting key may grant access to many data-encrypting
keys, the key-encrypting keys require strong protection measures.
PCI Security Standards Council® 13 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
PCI Security Standards Council® 14 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
3.7.7 Key management policies and procedures are implemented to include the
prevention of unauthorized substitution of cryptographic keys. 5
3.7.8 Key management policies and procedures are implemented to include that
cryptographic key custodians formally acknowledge (in writing or electronically) 5
that they understand and accept their key-custodian responsibilities.
3.7.9 Additional requirement for service providers only: Where a service
provider shares cryptographic keys with its customers for transmission or storage
of account data, guidance on secure transmission, storage and updating of such
keys is documented and distributed to the service provider's customers. 5
Applicability Notes
This requirement applies only when the entity being assessed is a service
provider.
Requirement 4: Protect Cardholder Data with Strong Cryptography
During Transmission
PCI Security Standards Council® 15 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
4.2.1.2 Wireless networks transmitting PAN or connected to the CDE use industry
best practices to implement strong cryptography for authentication and 2
transmission.
4.2.2 PAN is secured with strong cryptography whenever it is sent via end-user
messaging technologies.
Applicability Notes
This requirement also applies if a customer, or other third-party, requests that PAN
is sent to them via end-user messaging technologies.
There could be occurrences where an entity receives unsolicited cardholder data
via an insecure communication channel that was not intended for transmissions of 2
sensitive data. In this situation, the entity can choose to either include the channel
in the scope of their CDE and secure it according to PCI DSS or delete the
cardholder data and implement measures to prevent the channel from being used
for cardholder data.
5.1 Processes and mechanisms for protecting all systems and networks
from malicious software are defined and understood.
5.1.1 All security policies and operational procedures that are identified in
Requirement 5 are:
• Documented
• Kept up to date 6
• In use
• Known to all affected parties
PCI Security Standards Council® 16 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
5.3.2.1 If periodic malware scans are performed to meet Requirement 5.3.2, the
frequency of scans is defined in the entity’s targeted risk analysis, which is
performed according to all elements specified in Requirement 12.3.1.
Applicability Notes
This requirement applies to entities conducting periodic malware scans to meet 2
Requirement 5.3.2.
This requirement is a best practice until 31 March 2025, after which it will be
required and must be fully considered during a PCI DSS assessment.
5.3.4 Audit logs for the anti-malware solution(s) are enabled and retained in
accordance with Requirement 10.5.1. 2
PCI Security Standards Council® 17 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
5.4.1 Processes and automated mechanisms are in place to detect and protect
personnel against phishing attacks.
Applicability Notes
This requirement applies to the automated mechanism. It is not intended that the
systems and services providing such automated mechanisms (such as email
servers) are brought into scope for PCI DSS.
The focus of this requirement is on protecting personnel with access to system
components in-scope for PCI DSS.
Meeting this requirement for technical and automated controls to detect and
2
protect personnel against phishing is not the same as Requirement 12.6.3.1 for
security awareness training. Meeting this requirement does not also meet the
requirement for providing personnel with security awareness training, and vice
versa.
This requirement is a best practice until 31 March 2025, after which it will be
required and must be fully considered during a PCI DSS assessment.
PCI Security Standards Council® 18 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
6.2.3 Bespoke and custom software is reviewed prior to being released into
production or to customers, to identify and correct potential coding vulnerabilities,
as follows:
• Code reviews ensure code is developed according to secure coding 3
guidelines.
• Code reviews look for both existing and emerging software vulnerabilities.
• Appropriate corrections are implemented prior to release.
6.2.3.1 If manual code reviews are performed for bespoke and custom software
prior to release to production, code changes are:
• Reviewed by individuals other than the originating code author, and who are
knowledgeable about code-review techniques and secure coding practices.
• Reviewed and approved by management prior to release.
Applicability Notes
Manual code reviews can be conducted by knowledgeable internal personnel or 3
knowledgeable third-party personnel.
An individual that has been formally granted accountability for release control and
who is neither the original code author nor the code reviewer fulfills the criteria of
being management.
6.2.4 Software engineering techniques or other methods are defined and in use by
software development personnel to prevent or mitigate common software attacks
and related vulnerabilities for bespoke and custom software, including but not
limited to the following:
• Injection attacks, including SQL, LDAP, XPath, or other command,
parameter, object, fault, or injection-type flaws.
• Attacks on data and data structures, including attempts to manipulate buffers,
pointers, input data, or shared data.
• Attacks on cryptography usage, including attempts to exploit weak, insecure,
or inappropriate cryptographic implementations, algorithms, cipher suites, or
modes of operation.
• Attacks on business logic, including attempts to abuse or bypass application
features and functionalities through the manipulation of APIs, communication
protocols and channels, client-side functionality, or other system/application
functions and resources. This includes cross-site scripting (XSS) and cross-site
request forgery (CSRF). 3
• Attacks on access control mechanisms, including attempts to bypass or
abuse identification, authentication, or authorization mechanisms, or attempts to
exploit weaknesses in the implementation of such mechanisms.
• Attacks via any “high-risk” vulnerabilities identified in the vulnerability
identification process, as defined in Requirement 6.3.1.
Applicability Notes
This applies to all software developed for or by the entity for the entity’s own use.
This includes both bespoke and custom software. This does not apply to third-
party software.
PCI Security Standards Council® 19 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
6.3.3 All system components are protected from known vulnerabilities by installing
applicable security patches/updates as follows:
• Critical or high-security patches/updates (identified according to the risk
ranking process at Requirement 6.3.1) are installed within one month of release. 3
• All other applicable security patches/updates are installed within an
appropriate time frame as determined by the entity (for example, within three
months of release).
6.4.1 For public-facing web applications, new threats and vulnerabilities are
addressed on an ongoing basis and these applications are protected against
known attacks as follows:
• Reviewing public-facing web applications via manual or automated
application vulnerability security assessment tools or methods as follows:
• At least once every 12 months and after significant changes.
• By an entity that specializes in application security.
• Including, at a minimum, all common software attacks in Requirement 6.2.4.
• All vulnerabilities are ranked in accordance with requirement 6.3.1.
• All vulnerabilities are corrected.
• The application is re-evaluated after the corrections
OR
• Installing an automated technical solution(s) that continually detects and
prevents web-based attacks as follows:
• Installed in front of public-facing web applications to detect and prevent web-
based attacks. 3
• Actively running and up to date as applicable.
• Generating audit logs.
• Configured to either block web-based attacks or generate an alert that is
immediately investigated.
Applicability Notes
This assessment is not the same as the vulnerability scans performed for
Requirement 11.3.1 and 11.3.2.
This requirement will be superseded by Requirement 6.4.2 after 31 March 2025
when Requirement 6.4.2 becomes effective.
PCI Security Standards Council® 20 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
6.4.3 All payment page scripts that are loaded and executed in the consumer’s
browser are managed as follows:
• A method is implemented to confirm that each script is authorized.
• A method is implemented to assure the integrity of each script.
• An inventory of all scripts is maintained with written justification as to why
each is necessary.
Applicability Notes 2
This requirement applies to all scripts loaded from the entity’s environment and
scripts loaded from third and fourth parties.
This requirement is a best practice until 31 March 2025, after which it will be
required and must be fully considered during a PCI DSS assessment.
6.5.1 Changes to all system components in the production environment are made
according to established procedures that include:
• Reason for, and description of, the change.
• Documentation of security impact.
• Documented change approval by authorized parties.
• Testing to verify that the change does not adversely impact system security. 6
• For bespoke and custom software changes, all updates are tested for
compliance with Requirement 6.2.4 before being deployed into production.
• Procedures to address failures and return to a secure state.
PCI Security Standards Council® 21 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
6.5.5 Live PANs are not used in pre-production environments, except where those
environments are included in the CDE and protected in accordance with all 3
applicable PCI DSS requirements.
6.5.6 Test data and test accounts are removed from system components before
the system goes into production. 3
7.2.5 All application and system accounts and related access privileges are
assigned and managed as follows:
• Based on the least privileges necessary for the operability of the system or
application.
• Access is limited to the systems, applications, or processes that specifically
require their use. 4
Applicability Notes
This requirement is a best practice until 31 March 2025, after which it will be
required and must be fully considered during a PCI DSS assessment.
PCI Security Standards Council® 22 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
7.2.5.1 All access by application and system accounts and related access
privileges are reviewed as follows:
• Periodically (at the frequency defined in the entity’s targeted risk analysis,
which is performed according to all elements specified in Requirement 12.3.1).
• The application/ system access remains appropriate for the function being
performed.
• Any inappropriate access is addressed. 4
• Management acknowledges that access remains appropriate.
Applicability Notes
This requirement is a best practice until 31 March 2025, after which it will be
required and must be fully considered during a PCI DSS assessment.
7.2.6 All user access to query repositories of stored cardholder data is restricted
as follows:
• Via applications or other programmatic methods, with access and allowed
actions based on user roles and least privileges.
• Only the responsible administrator(s) can directly access or query
repositories of stored CHD.
Applicability Notes 4
This requirement applies to controls for user access to query repositories of stored
cardholder data.
See Requirements 7.2.5 and 7.2.5.1 and 8.6.1 through 8.6.3 for controls for
application and system accounts.
8.2 User identification and related accounts for users and administrators
are strictly managed throughout an account’s lifecycle.
8.2.1 All users are assigned a unique ID before access to system components or
cardholder data is allowed.
Applicability Notes
This requirement is not intended to apply to user accounts within point-of-sale 2
terminals that have access to only one card number at a time to facilitate a single
transaction (such as IDs used by cashiers on point-of-sale terminals).
PCI Security Standards Council® 23 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
8.2.3 Additional requirement for service providers only: Service providers with
remote access to customer premises use unique authentication factors for each
customer premises.
Applicability Notes
This requirement applies only when the entity being assessed is a service
provider. 2
This requirement is not intended to apply to service providers accessing their own
shared services environments, where multiple customer environments are hosted.
If service provider employees use shared authentication factors to remotely access
customer premises, these factors must be unique per customer and managed in
accordance with Requirement 8.2.2.
8.2.4 Addition, deletion, and modification of user IDs, authentication factors, and
other identifier objects are managed as follows:
• Authorized with the appropriate approval.
• Implemented with only the privileges specified on the documented approval.
Applicability Notes 2
This requirement applies to all user accounts, including employees, contractors,
consultants, temporary workers and third-party vendors.
8.2.8 If a user session has been idle for more than 15 minutes, the user is required
to re-authenticate to re-activate the terminal or session.
Applicability Notes
This requirement is not intended to apply to user accounts on point-of-sale
terminals that have access to only one card number at a time to facilitate a single
2
transaction (such as IDs used by cashiers on point-of-sale terminals).
This requirement is not meant to prevent legitimate activities from being performed
while the console/PC is unattended.
PCI Security Standards Council® 24 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
8.3.1 All user access to system components for users and administrators is
authenticated via at least one of the following authentication factors:
• Something you know, such as a password or passphrase.
• Something you have, such as a token device or smart card.
• Something you are, such as a biometric element.
Applicability Notes
This requirement is not intended to apply to user accounts on point-of-sale
terminals that have access to only one card number at a time to facilitate a single
transaction (such as IDs used by cashiers on point-of-sale terminals). 2
This requirement does not supersede multi-factor authentication (MFA)
requirements but applies to those in-scope systems not otherwise subject to MFA
requirements.
A digital certificate is a valid option for “something you have” if it is unique for a
particular user.
8.3.7 Individuals are not allowed to submit a new password/passphrase that is the
same as any of the last four passwords/passphrases used.
Applicability Notes
This requirement is not intended to apply to user accounts on point-of-sale 2
terminals that have access to only one card number at a time to facilitate a single
transaction (such as IDs used by cashiers on point-of-sale terminals).
PCI Security Standards Council® 25 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
PCI Security Standards Council® 26 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
8.4.3 MFA is implemented for all remote network access originating from outside
the entity’s network that could access or impact the CDE as follows:
• All remote access by all personnel, both users and administrators, originating
from outside the entity’s network.
• All remote access by third parties and vendors.
Applicability Notes
The requirement for MFA for remote access originating from outside the entity’s
network applies to all user accounts that can access the network remotely, where
that remote access leads to or could lead to access into the CDE.
If remote access is to a part of the entity’s network that is properly segmented from 2
the CDE, such that remote users cannot access or impact the CDE, MFA for
remote access to that part of the network is not required. However, MFA is
required for any remote access to networks with access to the CDE and is
recommended for all remote access to the entity’s networks.
The MFA requirements apply for all types of system components, including cloud,
hosted systems, and on-premises applications, network security devices,
workstations, servers, and endpoints, and includes access directly to an entity’s
networks or systems as well as web-based access to an application or function.
PCI Security Standards Council® 27 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
8.6.2 Passwords/passphrases for any application and system accounts that can be
used for interactive login are not hard coded in scripts, configuration/property files,
or bespoke and custom source code. Note: stored passwords/ passphrases are
required to be encrypted in accordance with PCI DSS Requirement 8.3.2.
Applicability Notes
Stored passwords/passphrases are required to be encrypted in accordance with 4
PCI DSS Requirement 8.3.2.
This requirement is a best practice until 31 March 2025, after which it will be
required and must be fully considered during a PCI DSS assessment.
PCI Security Standards Council® 28 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
9.2 Physical access controls manage entry into the cardholder data
environment.
9.2.1 Appropriate facility entry controls are in place to restrict physical access to
systems in the CDE. 2
9.2.1.1 Individual physical access to sensitive areas within the CDE is monitored
with either video cameras or physical access control mechanisms (or both) as
follows:
• Entry and exit points to/from sensitive areas within the CDE are monitored.
• Monitoring devices or mechanisms are protected from tampering or disabling. 2
• Collected data is reviewed and correlated with other entries.
• Collected data is stored for at least three months, unless otherwise restricted
by law.
9.2.2 Physical and/or logical controls are implemented to restrict use of publicly
accessible network jacks within the facility. 2
9.2.3 Physical access to wireless access points, gateways,
networking/communications hardware, and telecommunication lines within the 2
facility is restricted.
9.2.4 Access to consoles in sensitive areas is restricted via locking when not in
use. 2
9.3 Physical access to the cardholder data environment for personnel and
visitors is authorized and managed.
9.3.1 Procedures are implemented for authorizing and managing physical access
of personnel to the CDE, including:
• Identifying personnel.
• Managing changes to an individual’s physical access requirements. 5
• Revoking or terminating personnel identification.
• Limiting access to the identification process or system to authorized
personnel.
9.3.1.1 Physical access to sensitive areas within the CDE for personnel is
controlled as follows:
• Access is authorized and based on individual job function.
• Access is revoked immediately upon termination. 2
• All physical access mechanisms, such as keys, access cards, etc., are
returned or disabled upon termination.
9.3.2 Procedures are implemented for authorizing and managing visitor access to
the CDE, including:
• Visitors are authorized before entering.
• Visitors are escorted at all times. 5
• Visitors are clearly identified and given a badge or other identification that
expires.
• Visitor badges or other identification visibly distinguishes visitors from
personnel.
9.3.3 Visitor badges or identification are surrendered or deactivated before visitors
leave the facility or at the date of expiration. 5
9.3.4 A visitor log is used to maintain a physical record of visitor activity within the
facility and within sensitive areas, including:
• The visitor’s name and the organization represented.
• The date and time of the visit. 5
• The name of the personnel authorizing physical access.
• Retaining the log for at least three months, unless otherwise restricted by
law.
9.4 Media with cardholder data is securely stored, accessed, distributed,
and destroyed.
9.4.1 All media with cardholder data is physically secured. 5
9.4.1.1 Offline media backups with cardholder data are stored in a secure location. 5
PCI Security Standards Council® 29 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
9.4.1.2 The security of the offline media backup location(s) with cardholder data is
reviewed at least once every 12 months. 5
9.4.2 All media with cardholder data is classified in accordance with the sensitivity
of the data. 5
9.4.3 Media with cardholder data sent outside the facility is secured as follows:
• Media sent outside the facility is logged.
• Media is sent by secured courier or other delivery method that can be accurately 5
tracked.
• Offsite tracking logs include details about media location.
9.4.4 Management approves all media with cardholder data that is moved outside
the facility (including when media is distributed to individuals).
Applicability Notes
Individuals approving media movements should have the appropriate level of 5
management authority to grant this approval. However, it is not specifically
required that such individuals have “manager” as part of their title.
9.4.5 Inventory logs of all electronic media with cardholder data are maintained. 5
9.4.5.1 Inventories of electronic media with cardholder data are conducted at least
once every 12 months. 5
9.4.6 Hard-copy materials with cardholder data are destroyed when no longer
needed for business or legal reasons, as follows:
• Materials are cross-cut shredded, incinerated, or pulped so that cardholder
data cannot be reconstructed.
• Materials are stored in secure storage containers prior to destruction.
Applicability Notes
These requirements for media destruction when that media is no longer needed for 1
business or legal reasons are separate and distinct from PCI DSS Requirement
3.2.1, which is for securely deleting cardholder data when no longer needed per
the entity’s cardholder data retention policies.
9.4.7 Electronic media with cardholder data is destroyed when no longer needed
for business or legal reasons via one of the following:
• The electronic media is destroyed.
• The cardholder data is rendered unrecoverable so that it cannot be
reconstructed.
Applicability Notes
These requirements for media destruction when that media is no longer needed for 1
business or legal reasons are separate and distinct from PCI DSS Requirement
3.2.1, which is for securely deleting cardholder data when no longer needed per
the entity’s cardholder data retention policies.
PCI Security Standards Council® 30 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
9.5.1 POI devices that capture payment card data via direct physical interaction
with the payment card form factor are protected from tampering and unauthorized
substitution, including the following:
• Maintaining a list of POI devices.
• Periodically inspecting POI devices to look for tampering or unauthorized
substitution.
• Training personnel to be aware of suspicious behavior and to report
tampering or unauthorized substitution of devices.
Applicability Notes
These requirements apply to deployed POI devices used in card-present
transactions (that is, a payment card form factor such as a card that is swiped,
tapped, or dipped). This requirement is not intended to apply to manual PAN key- 2
entry components such as computer keyboards.
This requirement is recommended, but not required, for manual PAN key-entry
components such as computer keyboards.
This requirement does not apply to commercial off-the-shelf (COTS) devices (for
example, smartphones or tablets), which are mobile merchant-owned devices
designed for mass-market distribution.
9.5.1.2 POI device surfaces are periodically inspected to detect tampering and
unauthorized substitution. 2
9.5.1.2.1 The frequency of periodic POI device inspections and the type of
inspections performed is defined in the entity’s targeted risk analysis, which is
performed according to all elements specified in Requirement 12.3.1.
Applicability Notes 2
This requirement is a best practice until 31 March 2025, after which it will be
required and must be fully considered during a PCI DSS assessment.
Requirement 10: Log and Monitor All Access to System Components and
Cardholder Data
PCI Security Standards Council® 31 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
10.4.1 The following audit logs are reviewed at least once daily:
• All security events.
• Logs of all system components that store, process, or transmit CHD and/or
SAD.
• Logs of all critical system components. 4
• Logs of all servers and system components that perform security functions
(for example, network security controls, intrusion-detection systems/intrusion-
prevention systems (IDS/IPS), authentication servers).
10.4.1.1 Automated mechanisms are used to perform audit log reviews.
Applicability Notes
This requirement is a best practice until 31 March 2025, after which it will be 4
required and must be fully considered during a PCI DSS assessment.
10.4.2 Logs of all other system components (those not specified in Requirement
10.4.1) are reviewed periodically.
Applicability Notes
This requirement is applicable to all other in-scope system components not 4
included in Requirement 10.4.1.
PCI Security Standards Council® 32 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
10.4.2.1 The frequency of periodic log reviews for all other system components
(not defined in Requirement 10.4.1) is defined in the entity’s targeted risk analysis,
which is performed according to all elements specified in Requirement 12.3.1.
Applicability Notes 4
This requirement is a best practice until 31 March 2025, after which it will be
required and must be fully considered during a PCI DSS assessment.
10.4.3 Exceptions and anomalies identified during the review process are
addressed.
4
10.5.1 Retain audit log history for at least 12 months, with at least the most recent
three months immediately available for analysis. 4
10.6.2 Systems are configured to the correct and consistent time as follows:
• One or more designated time servers are in use.
• Only the designated central time server(s) receives time from external
sources.
• Time received from external sources is based on International Atomic Time or
Coordinated Universal Time (UTC).
• The designated time server(s) accept time updates only from specific 4
industry-accepted external sources.
• Where there is more than one designated time server, the time servers peer
with one another to keep accurate time.
• Internal systems receive time information only from designated central time
server(s).
PCI Security Standards Council® 33 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
10.7.2 Failures of critical security control systems are detected, alerted, and
addressed promptly, including but not limited to failure of the following critical
security control systems:
• Network security controls.
• IDS/IPS.
• Change-detection mechanisms.
• Anti-malware solutions.
• Physical access controls.
• Logical access controls.
• Audit logging mechanisms.
• Segmentation controls (if used). 4
• Audit log review mechanisms.
• Automated security testing tools (if used).
Applicability Notes
This requirement applies to all entities, including service providers, and will
supersede Requirement 10.7.1 as of 31 March 2025. It includes two additional
critical security control systems not in Requirement 10.7.1.
This requirement is a best practice until 31 March 2025, after which it will be
required and must be fully considered during a PCI DSS assessment.
10.7.3 Failures of any critical security controls systems are responded to promptly,
including but not limited to:
• Restoring security functions.
• Identifying and documenting the duration (date and time from start to end) of
the security failure.
• Identifying and documenting the cause(s) of failure, and documenting
required remediation.
• Identifying and addressing any security issues that arose during the failure.
• Determining whether further actions are required as a result of the security 4
failure.
• Implementing controls to prevent the cause of failure from reoccurring.
• Resuming monitoring of security controls.
Applicability Notes
This requirement applies only when the entity being assessed is a service
provider, until the 31 March 2025, after which this requirement will apply to all
entities.
This is a current v3.2.1 requirement that applies to service providers only.
However,
Requirementthis requirement
11: TestisSecurity
a best practice for all otherand
of Systems entities until 31 March
Networks
2025, after which it will be required and must be fully considered during a PCI DSS
Regularly
assessment.
11.1 Processes and mechanisms for performing activities in Requirement
11 are defined and understood.
11.1.1 All security policies and operational procedures that are identified in
Requirement 11 are:
• Documented.
• Kept up to date. 6
• In use.
• Known to all affected parties.
PCI Security Standards Council® 34 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
11.3.1.1 All other applicable vulnerabilities (those not ranked as high-risk or critical
(per the entity’s vulnerability risk rankings defined at Requirement 6.3.1) are
managed as follows:
• Addressed based on the risk defined in the entity’s targeted risk analysis,
which is performed according to all elements specified in Requirement 12.3.1.
• Rescans are conducted as needed.
Applicability Notes
The timeframe for addressing lower-risk vulnerabilities is subject to the results of a
risk analysis per Requirement 12.3.1 that includes (minimally) identification of
2
assets being protected, threats, and likelihood and/or impact of a threat being
realized.
This requirement is a best practice until 31 March 2025, after which it will be
required and must be fully considered during a PCI DSS assessment.
PCI Security Standards Council® 35 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
11.3.1.3 Internal vulnerability scans are performed after any significant change as
follows:
• High-risk and critical vulnerabilities (per the entity’s vulnerability risk rankings
defined at Requirement 6.3.1 are resolved.
• Rescans are conducted as needed.
• Scans are performed by qualified personnel and organizational
independence of the tester exists (not required to be a QSA or ASV). 2
Applicability Notes
Authenticated internal vulnerability scanning per Requirement 11.3.1.2 is not
required for scans performed after significant changes.
11.3.2.1 External vulnerability scans are performed after any significant change as
follows:
• Vulnerabilities that are scored 4.0 or higher by the CVSS are resolved.
• Rescans are conducted as needed. 2
• Scans are performed by qualified personnel and organizational
independence of the tester exists (not required to be a QSA or ASV).
PCI Security Standards Council® 36 PCI DSS v4.0 - Prioritized Approach Tool r1
PCI DSS v4.0 - Prioritized Approach Tool r1
PCI Security Standards Council® 37 PCI DSS v4.0 - Prioritized Approach Tool r1