Are You Ready for March 31, 2025?

Compliance
/
January 1, 2025
/
5 min read

Are You Ready for March 31, 2025? 

The explosive growth of online transactions has made the digital payment ecosystem one of the most dynamic—and vulnerable—landscapes in today’s business world. Events like Black Friday and Cyber Monday highlight this duality, as payment processors like Stripe and Adyen handled over $65 billion in just four days this past year, setting new records. But with this surge in transaction volume comes a parallel rise in cybercrime, making the protection of sensitive cardholder data more critical than ever. For businesses, there’s no room for error—payment security has become a defining factor in trust, reputation, and survival.

At PCI Proxy, we understand how vital compliance is for protecting payment data and maintaining customer trust. Since its introduction in 2006,the Payment Card Industry Data Security Standard (PCI DSS) has evolved to meet the growing complexities of payment security. Designed to safeguard payment data and reduce the risk of breaches, PCI DSS provides businesses with a robust, globally recognized framework for security. Over the years, updates to the standard have addressed everything from encryption requirements to the adoption of multifactor authentication (MFA) and anomaly detection, ensuring businesses stay ahead of evolving threats.

The release of PCI DSS version 4.0 in March 2022 marked a turning point for the standard, introducing 64 new requirements aimed at bolstering compliance and security practices. After a two-year transition period, PCI DSSv4.0 became mandatory in March 2024, with v4.0.1 following shortly after to add minor refinements. However, the most significant milestone is yet to come: March 31, 2025, when 51 of these new requirements, classified as future-dated, will officially become mandatory.

https://www.usd.de/en/news-pci-dss-v4-0-is-here/

For businesses working toward PCI DSS compliance, these future-dated requirements represent more than just a checklist—they are a critical opportunity to strengthen security measures and future-proof payment systems. As we approach this deadline, companies must act now to prepare for the changes ahead, ensuring they meet the evolving expectations of PCI DSS while continuing to protect sensitive data and maintain compliance.

At PCI Proxy, we’re here to help you navigate this pivotal phase. In the sections below, we’ll find a detailed breakdown of all the future-dated requirements.

Requirement 3 - Protect Stored Account Data.

-  3.2.1: Any SAD stored prior to completion of authorization is kept to a minimum through implementation of data retention and disposal policies, procedures, and processes.

-  3.3.2: SAD stored electronically prior to completion of authorization is encrypted using strong cryptography.

-  3.3.3: SAD stored by issuers is encrypted using strong cryptography.

-  3.4.2: Technical controls to prevent copy and/or relocation of PAN when using remote-access technologies except with explicit authorization.

-  3.5.1.1: Hashes used to render PAN unreadable are keyed cryptographic hashes of the entire PAN with associated key management processes and procedures.

-  3.5.1.2: Implementation of disk-level or partition level encryption when used to render PAN unreadable.

-  3.6.1.1: A documented description of the cryptographic architecture includes prevention of the use of the same cryptographic keys in production and test environments.

Requirement 4 - Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public Networks.

-  4.2.1 Certificates used to safeguard PAN during transmission over open, public networks are confirmed as valid and are not expired or revoked.

-  4.2.1.1 An inventory of the entity’s trusted keys and certificates is maintained.

Requirement 5 - Protect All Systems and Networks from Malicious Software.

-  5.2.3.1 A targeted risk analysis is performed to determine frequency of periodic evaluations of system components identified as not at risk for malware.

-  5.3.2.1 A targeted risk analysis is performed to determine frequency of periodic malware scans.

-  5.3.3 Anti-malware scans are performed when removable electronic media is in use.  

-  5.4.1 Mechanisms are in place to detect and protect personnel against phishing attacks.  

Requirement 6 - Develop and Maintain Secure Systems and Software.

-  6.3.2 Maintain an inventory of bespoke and custom software to facilitate vulnerability and patch management.  

-  6.4.2 Deploy an automated technical solution for public-facing web applications that continually detects and prevents web based attacks.

-  6.4.3 Manage all payment page scripts that are loaded and executed in the consumer’s browser.  

Requirement 7 - Restrict Access to System Components and Cardholder Data by Business Need to Know.

-  7.2.4 Review all user accounts and related access privileges appropriately.

-  7.2.5 Assign and manage all application and system accounts and related access privileges appropriately.

-  7.2.5.1 Review all access by application and system accounts and related access privileges.  

Requirement 8 - Identify Users and Authenticate Access to System Components.

-   8.3.6 Minimum level of complexity for passwords when used as an authentication factor.  

-  8.3.10.1 If passwords are the only authentication factor for customer user access, passwords are changed at least every 90 days or the security posture of accounts is dynamically analyzed to determine real time access to resources.

-  8.4.2 Multi-factor authentication for all access into the CDE.  

-  8.5.1 Multi-factor authentication systems are implemented appropriately.

-  8.6.1 Manage interactive login for accounts used by systems or applications.

-  8.6.2 Passwords/passphrases used for interactive login for application and system accounts are protected against misuse.  

-  8.6.3 Passwords/passphrases for any application and system accounts are protected against misuse.  

Requirement 9 - Restrict Physical Access to Cardholder Data.

-  9.5.1.2.1 A targeted risk analysis is performed to determine frequency of periodic POI device inspections.

Requirement 10 - Log and Monitor All Access to System Components and Cardholder Data.

-  10.4.1.1 Audit log reviews are automated.

-  10.4.2.1 A targeted risk analysis is performed to determine frequency of log reviews for all other system components.

-  10.7.2 Failures of critical security control systems are detected, alerted, and addressed promptly.  

-  10.7.3 Failures of critical security control systems are responded to promptly.  

Requirement 11 - Test Security of Systems and Networks Regularly.

-  11.3.1.1 Manage all other applicable vulnerabilities (those not ranked as high risk or critical).

-  11.3.1.2 Internal vulnerability scans are performed via authenticated scanning.

-  11.4.7 Multi-tenant service providers support their customers for external penetration testing.

-  11.5.1.1 Covert malware communication channels detect, alert and/or prevent, and address via intrusion-detection and/or intrusion-prevention techniques.

-  11.6.1 A change-and-tamper-detection mechanism is deployed for payment pages.  

Requirement 12 - Support Information Security with Organizational Policies and Programs.

-  12.3.1 A targeted risk analysis is documented to support each PCI DSS requirement that provides flexibility for how frequently it is performed.  

-  12.3.3 Cryptographic cipher suites and protocols in use are documented and reviewed.

-  12.3.4 Hardware and software technologies are reviewed.  

-  12.5.2.1 PCI DSS scope is documented and confirmed at least once every six months and upon significant changes.

-  12.5.3 The impact of significant organizational changes on PCI DSS scope is documented and reviewed and results are communicated to executive management.

-  12.6.2 The security awareness program is reviewed at least once every 12 months and updated as needed.

-  12.6.3.1 Security awareness training includes awareness of threats that could impact the security of the CDE, to include phishing and related attacks and social engineering.  

-  12.6.3.2 Security awareness training includes awareness about acceptable use of end user technologies.  

-  12.10.4.1 A targeted risk analysis is performed to determine frequency of periodic training for incident response personnel.  

-  12.10.5 The security incident response plan includes alerts from the change- and tamper-detection mechanism for payment pages.

-  12.10.7 Incident response procedures are in place and initiated upon detection of PAN.

Appendix A1 - Additional PCI DSS Requirements for Multi-Tenant Service Providers.

-  A1.1.1 The multi-tenant service provider confirms access to and from customer environment is logically separated to prevent unauthorized access

-  A1.1.4 The multi-tenant service provider confirms effectiveness of logical separation controls used to separate customer environments at leave once every six months via penetration testing.

-  A1.2.3 The multi-tenant service provider implements processes or mechanisms for reporting and addressing suspected or confirmed security incidents and vulnerabilities.

Appendix A3 - Designated Entities Supplemental Validation (DESV).

-  A3.3.1 Failures of the following are detected, alerted, and reported in a timely manner: Automated log review mechanisms Automated code review tools

By staying ahead of these upcoming PCI DSS requirements, you’ll not only ensure your business remains secure and compliant but also build trust with your customers, positioning your brand for success in the evolving digital payment landscape.

Want to learn more?

Fill out the form below and a member of our team will be in touch.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sascha Huwyler
Head of PCI Proxy

“Independent, fast and reliable – in this age of dizzying transformation, following through is more important than ever. We don’t promise anything we can’t actually deliver. And we stand by what we say.”

This is some text inside of a div block.
  Copied to clipboard