Document Comparison

PCI_DSS-QRG-v4_0.pdf PCI-DSS-v4_x-QRG.pdf
99% similar
38 → 38 Pages
9667 → 9728 Words
16 Content Changes

Content Changes

16 content changes. 5 administrative changes (dates, page numbers) hidden.

Added p. 14
See the ASV Resource Guide for an overview of ASV scans and answers to common questions.
Added p. 33
See the ASV Resource Guide for an overview of ASV scans and answers to common questions.
Modified p. 2
PCI DSS Quick Reference Guide: Understanding the Payment Card Industry Data Security Standard version 4.0.
PCI DSS Quick Reference Guide: Understanding the Payment Card Industry Data Security Standard version 4.x.
Modified p. 2
August 2022 3 This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
January 2025 3 This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
Modified p. 5
POS Merchant Acquirer Service Provider INTERNET PUBLIC NETWORKS WIRELESS INTERNET PUBLIC NETWORKS WIRELESS INTERNET PUBLIC NETWORKS WIRELESS The intent of this PCI DSS v4.0 Quick Reference Guide is to help you understand how PCI DSS can help protect your payment processing environment and how to apply the standard.
POS Merchant Acquirer Service Provider INTERNET PUBLIC NETWORKS WIRELESS INTERNET PUBLIC NETWORKS WIRELESS INTERNET PUBLIC NETWORKS WIRELESS The intent of this PCI DSS v4.x Quick Reference Guide is to help you understand how PCI DSS can help protect your payment processing environment and how to apply the standard.
Modified p. 7
Mobile Standards

• Includes the Contactless Payments on COTS (CPoC) and Software-based PIN Entry on COTS (SPoC) standards for mobile payment-acceptance solutions on commercial-off-the-shelf (COTS) devices (e.g., smartphone or tablet) in a merchant-attended environment.
Mobile Standards

• Includes the Contactless Payments on COTS (CPoC), Mobile Payments on COTS (MPoC), and Software-based PIN Entry on COTS (SPoC) standards for mobile payment-acceptance solutions on commercial-off-the-shelf (COTS) devices (e.g., smartphone or tablet) in a merchant-attended environment.
Modified p. 7
Other Standards

• Other PCI Standards define controls and testing requirements for PIN security, physical and logical card production and provisioning, token service providers, and access security (3-D Secure).
Other Standards

• Other PCI Standards define controls and testing requirements for PIN security, physical and logical card production and provisioning, token service providers, and security to protect environments where specific 3DS functions occur (3-D Secure).
Modified p. 9
PCI DSS is intended for all entities that store, process, or transmit cardholder data (CHD) and/or sensitive authentication data (SAD) or could impact the security of the cardholder data environment (CDE). This includes all entities involved in payment account processing

• merchants, processors, acquirers, issuers, and other service providers. Cardholder data and sensitive authentication data are considered account data and are defined as follows:
PCI DSS is intended for all entities that store, process, or transmit cardholder data (CHD) and/or sensitive authentication data (SAD) or could impact the security of the cardholder data and/or sensitive authentication data. This includes all entities involved in payment account processing

• merchants, processors, acquirers, issuers, and other service providers. Cardholder data and sensitive authentication data are considered account data and are defined as follows:
Modified p. 9
PCI DSS requirements apply to entities with environments where account data (cardholder data and/or sensitive authentication data) is stored, processed, or transmitted, and entities with environments that can impact the security of the CDE. Some PCI DSS requirements may also apply to entities with environments that do not store, process, or transmit account data

• for example, entities that outsource payment operations or management of their CDE.
PCI DSS requirements apply to entities with environments where account data (cardholder data and/ or sensitive authentication data) is stored, processed, or transmitted, and entities with environments that can impact the security of cardholder data and/or sensitive authentication data. Some PCI DSS requirements may also apply to entities with environments that do not store, process, or transmit account data

• for example, entities that outsource payment operations or management of their cardholder data environment (CDE).
Modified p. 14
Choosing an Approved Scanning Vendor The ASV’s role is to determine whether the customer meets the PCI DSS external vulnerability scanning requirements. ASVs and their ASV scan solutions are qualified by the PCI Security Standards Council to perform external network and system scans as required by PCI DSS. An ASV may use its own software or a commercial or open-source solution that is PCI-approved as part of the ASV qualification process. An ASV scan solution includes the scanning procedures and …
Choosing an Approved Scanning Vendor The ASV’s role is to determine whether the customer meets the PCI DSS external vulnerability scanning requirements. ASVs and their ASV scan solutions are qualified by the PCI Security Standards Council to perform external network and system scans as required by PCI DSS. An ASV may use its own software or a commercial or open-source solution that is PCI-approved as part of the ASV qualification process. An ASV scan solution includes the scanning procedures and …
Modified p. 15
• System components, people, and processes that could impact the security of the CDE.
• System components, people, and processes that could impact the security of the cardholder data and/ or sensitive authentication data.
Modified p. 17
Understanding responsibilities between customers and TPSPs Customers and TPSPs should clearly identify and understand the services and system components included in the scope of the TPSP’s PCI DSS assessment, the specific PCI DSS requirements and sub- requirements covered by the TPSP’s PCI DSS assessment, and any requirements that are the responsibility of the TPSP’s customers to include in their own PCI DSS assessments, and any requirements for which responsibility is shared between the TPSP and its customers.
Understanding responsibilities between customers and TPSPs Customers and TPSPs should clearly identify and understand the services and system components included in the scope of the TPSP’s PCI DSS assessment, the specific PCI DSS requirements and sub- requirements covered by the TPSP’s PCI DSS assessment, any requirements that are the responsibility of the TPSP’s customers to include in their own PCI DSS assessments, and any requirements for which responsibility is shared between the TPSP and its customers.
Modified p. 19
Understanding PCI DSS v4.0 This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
Understanding PCI DSS v4.x This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
Modified p. 20
Understanding PCI DSS v4.0 Approaches for Implementing and Validating PCI DSS To provide flexibility for different ways entities may use to meet security objectives, PCI DSS v4.0 includes two approaches for implementing controls and validating to PCI DSS. Entities should identify the approach, or combination of approaches, best suited to their needs.
Understanding PCI DSS v4.x Approaches for Implementing and Validating PCI DSS To provide flexibility for different ways entities may use to meet security objectives, PCI DSS v4.x includes two approaches for implementing controls and validating to PCI DSS. Entities should identify the approach, or combination of approaches, best suited to their needs.
Modified p. 23
Summary of PCI DSS v4.0 Requirements 1•12 Build and Maintain a Secure Network and Systems In the past, theft of financial records required a criminal to physically enter an entity’s business site. Now, payment transactions occur with many different electronic devices, including traditional payment terminals, mobile devices, and other Internet connected computer systems. By using network security controls, entities can prevent criminals from virtually accessing payment system networks and stealing payment account data.
Summary of PCI DSS v4.x Requirements 1•12 Build and Maintain a Secure Network and Systems In the past, theft of financial records required a criminal to physically enter an entity’s business site. Now, payment transactions occur with many different electronic devices, including traditional payment terminals, mobile devices, and other Internet connected computer systems. By using network security controls, entities can prevent criminals from virtually accessing payment system networks and stealing payment account data.
Modified p. 33
Requirement 11: Test security of systems and networks regularly Vulnerabilities are being discovered continually by malicious individuals and researchers, and being introduced by new software. System components, processes, and bespoke and custom software should be tested frequently to ensure security controls continue to reflect a changing environment.
Requirement 11: Test security of systems and networks regularly Vulnerabilities are being discovered continually by malicious individuals and researchers, as well as being introduced by new software. System components, processes, and bespoke and custom software should be tested frequently to ensure security controls continue to reflect a changing environment.