March 18, 2025
For any company involved in any facet of payment card processing, March 31, 2025, looms as the deadline for meeting the updated Payment Card Industry Data Security Standard (PCI DSS) version 4.0, first issued April 1, 2024.
The updated standard focuses on enhanced security practices like stronger encryption, improved access controls and more robust vulnerability management – the latter of which is already an albatross around a CISO’s neck with the tremendous backlog of Common Vulnerabilities and Exploits (CVEs) to manage.
The PCI DSS first arrived in 2004 to ensure companies achieve data protection by establishing security control effectiveness. As cybercriminals’ tactics and targets have evolved, PCI standards have also expanded to keep up with the two-headed beast: an increasingly complex threat landscape combined with a continuously widening attack surface.
The latest updates aim to address emerging threats while providing flexibility for organizations to innovate to achieve PCI compliance. While these changes are intended to help payment processors strengthen security and reduce risk – for themselves, their partners and customers – adhering to such compliance changes is never easy for already-strained security teams.
To understand the scope of the challenge, let’s take a look at PCI DSS 4.0’s major changes:
Allows organizations to meet security objectives using controls tailored to their environment, emphasizing outcomes-based compliance, offering flexibility while requiring detailed risk assessments and documentation.
Requires organizations to conduct structured risk assessments and report on security strategies more comprehensively. The scope of requirements expanded to include cloud environments and service providers, reflecting modern payment industry practices.
The updated PCI-DSS v4.0 removes ambiguity around the types of multifactor authentication (MFA)/two-factory authentication (2FA) and where to use them. This change makes it clear that this requirement applies to both Administrative and Non-Administrative Accounts utilized for accessing Customer Data Environments.
Requires continuous monitoring and testing of an organization’s security controls to ensure ongoing compliance and threat mitigation.
Focuses on protecting Primary Account Numbers (PANs) through keyed cryptographic hashes and other advanced methods.
These new PCI DSS 4.0 requirements cause headaches for security teams when having to update aging infrastructure and implement new systems and tools to address various components. In particular, the mandate for routine monitoring and testing while consistently applying security patches to mitigate vulnerabilities may seem daunting, but Contrast can do it continuously — one of only a few solutions that can.
This is especially true in the application layer, which is where a majority of attacks originate. (According to Verizon’s annual Data Breach Investigations Report (DBIR), two of the top three types of cybersecurity incidents in 2024 stemmed from applications — the number one culprit being web application credentials and number three being exploited application vulnerabilities.)
The unfortunate truth is that the application layer is an organizational blindspot with existing cybersecurity tools. Endpoint detection and response (EDR), cloud detection and response (CDR), and network detection and response (NDR) all serve an important function in providing visibility into their respective areas. But until recently, the application layer was left in the cold.
ADR and application vulnerability monitoring (AVM) provide better visibility into the vulnerability management of your applications, providing real-time protections that in turn allow security teams the time to properly triage and address the identified vulnerabilities.
ADR, together with application vulnerability monitoring (AVM), both secures the application and continuously monitors for vulnerabilities in live applications, thereby streamlining a company’s compliance efforts while relieving security teams of the stress and worry of trying to keep up with the onslaught of malicious activities.
Specific features and capabilities that ADR tools provide to meet specific aspects of PCI DSS 4.0 include:
ADR addresses PCI DSS requirements for continuous monitoring and proactive security testing by:
ADR enhances patch management processes by:
The clock is ticking on PCI DSS 4.0; it's time to adopt automation and application-layer visibility to help you hurdle threats. ADR isn't just a tool, it's the helping hand your security teams need to reach compliance
Want to learn more about how Contrast ADR can help your compliance efforts? Book a demo today.
Read more:
Get the latest content from Contrast directly to your mailbox. By subscribing, you will stay up to date with all the latest and greatest from Contrast.