
In the 1990s and early 2000s, the rise of online shopping led to an increase in credit card fraud. Traditional businesses began selling their products and services online, which, while convenient for customers, introduced security vulnerabilities that cybercriminals exploited. To address these security issues the major card brands developed security programs:
Each program had a similar goal: to enhance protection for card issuers by ensuring that merchants adhere to minimum security standards when storing, processing, and transmitting cardholder data. Having various programs to comply with lead to interoperability problems. In response to this issue, in 2004, VISA, Mastercard, Discover, JCB and American Express developed the Payment Card Industry Data Security Standard (PCI DSS). Soon afterward, in 2006, the four companies together with Discover Financial Services established the Payment Card Industry Security Standards Council (PCI SCC). The PCI SSC serves as an international platform dedicated to the continuous development, improvement, storage, distribution, and implementation of security standards for protecting account data. Their mission is to strengthen payment account data security worldwide by creating standards and offering support services that promote education, awareness, and effective implementation among stakeholders.
The PCI DSS, as a dynamic framework designed to adapt to the ever-evolving landscape of payment security, has undergone periodic updates and improvements to address emerging threats, incorporate feedback from stakeholders, and reflect current best practices in data security.

On 31 March 2024, PCI DSS Version 3.2.1 ceased to be active and was replaced by PCI DSS Version 4.0, which will be retired on 31 December 2024. At that point, PCI DSS Version 4.0.1 will be the only active version of the standard supported by PCI SSC. The current version of the PCI DSS has the following 6 Domains and 12 Requirements:
PCI DSS applies to any organization that stores, processes, or transmits cardholder data (CHD) and/or sensitive authentication data (SAD), or that could affect the security of the cardholder data environment (CDE). This encompasses all entities engaged in payment account processing, such as merchants, processors, acquirers, issuers, and other service providers.
Cardholder data and sensitive authentication data are considered account data. The definitions for each are provided in the table below:
Cardholder Data: | Sensitive Authentication Data: |
|
|
PCI DSS requirements pertain to entities that store, process, or transmit account data (cardholder data and/or sensitive authentication data), as well as those that can impact the security of the CDE. Additionally, certain PCI DSS requirements may apply to entities that do not directly handle account data but outsource payment operations or CDE management.
Organizations have until 31 March 2025, to adopt the new requirements introduced as best practices in PCI DSS Version 4.0.1. Until then, validation of the new requirements is not mandatory. However, organizations that have already implemented these controls and wish to have them assessed before the effective date are encouraged to do so. After 31 March 2025, the new requirements become effective and must be included in PCI DSS assessments.
The HackEthic team strongly urges those obliged to comply with PCI DSS Version 4.0.1 to swiftly meet the outlined requirements. To this end, the team also stands ready to offer assistance.