Goal 1: Build and Maintain a Secure Network and Systems
Requirement 1: Install and Maintain Network Security Controls
- 1.2. Network security controls configuration and maintenance
- 1.3. Network access to/from CDE restricted
- 1.4. Network connections between trusted and untrusted networks controlled
- 1.5. Risks to CDE from computing devices that connect to both untrusted networks and CDE mitigated
Requirement 2: Apply Secure Configurations to All System Components
- 2.2. System components configured securely
- 2.3. Wireless environments configured securely (includes vendor defaults)
Goal 2: Protect Account Data
Requirement 3: Protect Stored Account Data
- 3.2. Account data storage minimized
- 3.3. Sensitive authentication data not stored after authorization
- 3.4. Primary Account Number display masked
- 3.5. PAN made unreadable wherever stored (encryption, hashing, truncation, tokenization)
- 3.6. Cryptographic keys protected
- 3.7. Key management procedures
Requirement 4: Protect Cardholder Data with Strong Cryptography During Transmission
- 4.2. PAN protected with strong cryptography during transmission over open public networks
Goal 3: Maintain a Vulnerability Management Program
Requirement 5: Protect All Systems Against Malware
- 5.2. Malicious software prevented or detected
- 5.3. Anti-malware mechanisms active, maintained, and monitored
- 5.4. Anti-phishing mechanisms (workforce-facing)
Requirement 6: Develop and Maintain Secure Systems and Software
- 6.2. Bespoke and custom software developed securely
- 6.3. Security vulnerabilities identified and addressed
- 6.4.3 (2026 enforcement). Payment page scripts inventoried, justified, and authorized
- 6.5. Changes to system components managed securely
Goal 4: Implement Strong Access Control Measures
Requirement 7: Restrict Access by Business Need-to-Know
- 7.2. Access to system components and data defined and assigned
- 7.3. Access controls managed via access control system
Requirement 8: Identify Users and Authenticate Access
- 8.2. User identification managed throughout the account lifecycle
- 8.3. Strong authentication established; MFA required for all non-console admin access and all remote access to CDE
- 8.4. MFA implemented to secure non-console admin access
- 8.5. MFA systems configured to prevent misuse
- 8.6. Authentication for applications, scripts, and services
Requirement 9: Restrict Physical Access to Cardholder Data
- 9.2. Physical access controls
- 9.3. Personnel authorization and access to CDE managed
- 9.4. Media security
- 9.5. POI device security (for card-present merchants)
Goal 5: Regularly Monitor and Test Networks
Requirement 10: Log and Monitor All Access
- 10.2. Audit logs capture relevant events
- 10.3. Audit logs protected from destruction and unauthorized modification
- 10.4. Audit logs reviewed to identify anomalies or suspicious activity
- 10.5. Audit log history retained
- 10.6. Time-synchronization mechanisms
- 10.7. Failures of critical security control systems detected, reported, and responded to
Requirement 11: Test Security of Systems and Networks Regularly
- 11.2. Wireless access points identified and managed
- 11.3. External and internal vulnerabilities identified and managed (quarterly ASV scans)
- 11.4. Penetration testing performed regularly (annual internal + external, plus after significant change; segmentation testing annual/semi-annual)
- 11.5. Intrusion detection or prevention monitoring
- 11.6.1 (2026 enforcement). Payment page script changes detected and alerted
Goal 6: Maintain an Information Security Policy
Requirement 12: Support Information Security with Organizational Policies and Programs
- 12.2. Acceptable use policies
- 12.3. Risks to cardholder data environment formally managed
- 12.4. Compliance monitoring
- 12.5. PCI DSS scope documented and validated
- 12.6. Security awareness program
- 12.7. Personnel screened
- 12.8. Third-party service provider risk managed
- 12.9. Third-party service providers acknowledge responsibility
- 12.10. Suspected and confirmed security incidents responded to immediately
2026 biting points
Since the March 2025 mandate, the requirements catching merchants most often:
- 6.4.3 and 11.6.1. Payment page script inventory and change detection. Most merchants had never audited the third-party scripts on their checkout pages before. Implementation options: Content Security Policy, Subresource Integrity, or commercial tools (Feroot DomainGuard, Human Security).
- 8.3 phishing-resistant MFA. SMS is out. TOTP at minimum. FIDO2/passkeys preferred for admin access.
- 11.4 penetration testing. Annual internal + external. Merchants with only quarterly ASV scans are failing.
- 12.8 third-party service provider risk. Formal vendor risk management, not just "we have a contract."
Merchant vs service provider. Service provider requirements are stricter. If you store, process, or transmit cardholder data on behalf of another merchant, you are a service provider and segmentation testing is semi-annual (not annual), penetration testing requirements are stricter, and formal PCI DSS attestation (AOC) is expected.
