Dynamic Business Logo
Home Button
Bookmark Button

Source: Naipo on Unsplash

PCI DSS 4.0: What Australian businesses need to know

For over two decades, the Payment Card Industry Data Security Standard (PCI DSS) has been instrumental in safeguarding sensitive cardholder information.

Established in 2004, the standard now serves as a global benchmark. It provides organisations with a framework to secure payment card systems and protect cardholder data, ensuring those handling sensitive information maintain a secure and compliant environment. 

On 31st March 2025, PCI DSS 4.0 comes into effect: the latest release of the standard. All Australian businesses accepting credit and debit card payments must comply with new stringent requirements and important updates by this date or face non-compliance fines up to USD $100,000 monthly.  

Beyond compliance lies transformation

Published back in 2022, organisations were given a three-year window to make the changes necessary to comply with PCI DSS 4.0. In total, 64 new requirements have been identified to address critical architectural, control, and design risks organisations face when accepting and processing payment card transactions. 

There’s no doubt PCI DSS 4.0 will transform to the way organisations operate today – and these are the six key changes Aussie businesses should know about:

  1. Flexible fraud protection: despite bringing in stringent new requirements, PCI DSS 4.0 empowers organisations to select the most suitable methods and technologies to achieve their security objectives, provided they can validate and document their efficacy. This flexibility enables organisations to embrace innovative compliance strategies freely.
  1. Always-on security processes: companies must monitor and evaluate their security posture, including that of their supply chain, on an ongoing basis and undertake validation activities at least annually or in response to significant changes. 
  1. Stronger identity verification: organisations must employ stronger and more secure methods to verify the identity of users, devices, and systems while ensuring the confidentiality and integrity of cardholder data, whether in transit or at rest. 
  1. Secure system components: PCI DSS 4.0 will cover any system components used to capture, process, or store cardholder data. 
  1. Diversify techniques: organisations must use more advanced and varied techniques for detecting and preventing fraud, such as tokenisation, point-to-point encryption, and biometrics.
  1. Constant compliance: organisations must continuously assess their security posture and document their control effectiveness, rather than doing one assessment annually. 

Plan to fail, if you fail to plan

With just six months left to put multiple new requirements into effect before PCI DSS 4.0 audits begin, many companies are nearing the finish line.

Those just getting started should understand that PCI DSS 4.0 is a major update that places a considerable toll on organisations to meet compliance. Anyone who hasn’t yet started the process should consider this month the final call to get their ducks in a row. Budgeting, planning, implementing, testing, and attesting to solutions is complex and cannot be achieved overnight.

Familiarise yourself with the changes – ensuring you understand them is essential in preparing an effective compliance strategy. The PCI Security Standards Council provides detailed documentation outlining the updates, additions, and modifications to the standard.

Conduct a gap analysis will help assess the current state of your organisation’s security posture in relation to the updated standard. This process involves identifying any discrepancies between existing security controls and the new requirements of PCI DSS 4.0, prioritising necessary changes and allocating resources effectively. 

Assemble a cross-functional team including representatives from IT, security, legal, compliance, and any other relevant departments. Collaborative efforts will ensure a holistic approach to implementing the necessary changes and will foster better communication throughout the process. Combine this with executive sponsorship and buy-in to support the investment necessary to address the compliance obligation early.

Develop a comprehensive remediation plan based on the outcome from the two previous steps. This plan should outline the specific steps needed to address each identified gap and ensure alignment with the new PCI DSS 4.0 requirements. Clearly define roles, responsibilities, timelines, and milestones to keep the project on track.

Implement updated security controls which may involve upgrading or replacing existing security tools, enhancing network security, implementing multi-factor authentication, upgrading data encryption and key security systems, and regularly monitoring and testing security systems

Conduct regular internal assessments, audits and vulnerability scans to identify any potential issues and address them promptly. Regularity help maintain a proactive security posture and avoid compliance lapses

When mandated, engage with Qualified Security Assessors (QSAs) for an external validation assessment. Close collaboration with the QSAs will ensure they have access to all necessary information for a smooth assessment process

Business and security leaders should see the transition from PCI DSS 3.2 to PCI DSS 4.0 as more than a compliance exercise. It’s about improving organisations’ security posture, recognising the interconnectedness of cybersecurity and fraud management, and redefining how organisations protect cardholder data. 

Only through a highly coordinated effort and methodical plan can businesses effectively address the differences brought by the new PCI DSS version. By enhancing their payment card data security and better protecting customer information businesses can build trust, credibility, and a solid reputation.

Keep up to date with our stories on LinkedInTwitterFacebook and Instagram.

What do you think?

    Be the first to comment

Add a new comment

Reinhart Hansen

Reinhart Hansen

Reinhart Hansen is the Director of Technology, APJ at Imperva, a Thales company

View all posts