As of March 31, 2025, all PCI DSS 4.0.1 requirements became mandatory. If you process, store, or transmit cardholder data and haven't completed your gap assessment, you're now out of compliance.
PCI DSS 4.0.1 introduced over 60 new or updated requirements compared to PCI DSS 3.2.1. The most significant changes include mandatory multi-factor authentication for all access to the Cardholder Data Environment (CDE), enhanced requirements for phishing-resistant authentication controls, updated penetration testing standards requiring more comprehensive testing, new requirements for web application security including web application firewalls, and enhanced logging and monitoring requirements. All of these requirements became mandatory on March 31, 2025.
PCI DSS applies to any organization that processes, stores, or transmits payment card data. This includes retailers, restaurants, healthcare providers, professional services firms, and any other business that accepts credit or debit card payments. It also applies to service providers who process card data on behalf of merchants. If your business accepts card payments — even through a third-party payment processor — you have PCI DSS obligations. The scope of your obligations depends on your transaction volume and how you handle card data.
In our work with San Antonio SMBs, the most common PCI DSS 4.0.1 gaps we are finding include: failure to implement MFA for all CDE access (many businesses still use single-factor authentication for point-of-sale systems and payment portals), outdated network segmentation that does not adequately isolate the CDE from other network segments, insufficient logging and log review processes, and penetration testing that does not meet the updated PCI DSS 4.0.1 requirements. Many businesses also lack a formal vulnerability management program that meets the new requirements.
If you have not completed a PCI DSS 4.0.1 gap assessment, start there. Identify all systems that store, process, or transmit cardholder data and map your Cardholder Data Environment. Implement MFA for all CDE access immediately — this is the most commonly cited gap and one of the most important controls. Review your network segmentation to ensure the CDE is properly isolated. Update your penetration testing program to meet the new requirements. Document all of your compliance activities — documentation is a key part of demonstrating compliance during an assessment.
Our San Antonio security team can assess your exposure, apply patches, and protect your business before attackers strike.
Get weekly security alerts — breaches, patch updates, compliance news, and threat intel — delivered free to your inbox every week.