The new PCI DSS 4.0 standard introduces many new requirements to properly secure Cardholder Data (CHD) and Sensitive Authentication Data (SAD). It becomes effective on March 31, 2025, and is the only active version of the standard. This blog outlines the challenges and solutions to help you become compliant with the strict requirements of PCI DSS 6.4.3 and 11.6.1.
The primary goal of these new standards are to tackle the increasing threat of client-side attacks. These attacks include cross-site scripting (XSS), form-jacking and e-commerce skimming, as found in Magecart attacks. Such attacks entail embedding malicious scripts into payment pages to steal sensitive user data. These scripts can function in real-time, capturing payment card information and personal identifiable information (PII) as the consumer inputs it.
Any organisation who has a payment page on their website needs to attest that they’ve adhered to the standard yearly. IT environments are constantly changing. There is an expectation that organisations will monitor their environments periodically throughout the year.
Outsourcing all site transactions to a PCI Compliance service provider is often not practical as most merchants manage the customer experience and the function of their own website. Depending on the level of integration with the payment provider, you will still need to adhere to the new standards.
Accepting the risk is not a recommended option, as the fines from the major credit card companies (VISA, AMEX, Mastercard, etc.) are recurrent and increased in value until the business becomes compliant with the standard.
We provide a leading solution for addressing threats and risks originating from the increased use of JavaScript, third-party vendors, and open-source code in your web properties.
We can help you:
You'll be able to:
We can you with a free trial for your website. This will enable you to understand your position with an assessment of your current environment.
Visit our webpage here to https://info.vectra-corp.com/javascript-monitoring-for-pci-dss-4.0 to sign up for a complimentary assessment for your environment.
Vectra has over 4,000 PCI DSS clients, ranging from Australian telcos, banks, airlines, and many midsize organisations and SMBs through their banking partner. As the pioneer in PCI DSS compliance in Australia, we’re specialists helping organisations address regulatory change. As a PCI Participating Organisation, we assisted in the DSS 4.0 development process and can help you navigate these changes and ensure your payment environment is secure.
You should adhere to two new requirements.
PCI DSS 6.4.3 requirements focus on managing payment page scripts that are loaded and executed in the consumer's browser. Here are the key points:
These measures are designed to protect against client-side attacks, such as those involving malicious scripts that can steal sensitive user data directly from the browser.
PCI DSS 11.6.1 requirements focus on change and tamper detection mechanisms for payment pages. Here are the key points:
These measures are designed to protect against client-side attacks by ensuring that any unauthorized changes or tampering with payment pages are promptly detected and addressed.
For merchants completing SAQ-A, using an iFrame can affect your compliance. Websites outsourced to third parties (often multiple providers) should check they have successfully implemented the necessary measure to protect against client-side attacks and unauthorised changes to payment pages. Make sure you have time to meet the requirements before the deadline.