The PCI DSS 3.2.1 Clock Has Hit the Midnight Hour... Are You Ready for 4.0?

F5 Ecosystem | April 01, 2024

Sunday, March 31, 2024, an important date worldwide has come and gone. Why do I say that? For any organization taking consumer payments, it is the date that PCI DSS 3.2.1 compliance standard has been retired (May 1, 2018 – March 31, 2024). Your organization is now on the PCI DSS 4.0 timeline and will have to have completed a 4.0-compliant SAQ and an audit by an external organization by March 2025. Non-adherence to PCI DSS 4.0 is not an option if you want to book revenue via consumer payments.

The PCI DSS 4.0 specification is a major upgrade from 3.2.1 and you can find the summary of the changes here. Version 4.0 introduces numerous changes (and an updated SAQ as well) but there are two net-new areas that need to be secured in the overall structure in order to hit and maintain compliance:

  • Application programming interface (API) [2.2.7; 6.2.3; 6.2.4]
  • Bespoke software [6.X; 8.6.2; 12.8.1]

For the sake of simplicity, we’ll go just a bit deeper on a portion of ‘bespoke software’ only. This is custom software built by the organization to help facilitate consumer payment. Bespoke software is as follows:

  • Developed internally or from external third-party sources
  • Software developed for the payment application (server-side of transaction) or pushed out to the consumer’s web browser (client-side of transaction) to drive collection of data

A challenge for many organizations will be extending the security and PCI DSS compliance of bespoke software out to the consumer’s web browser (Requirements 6.4.1; 11.6.1). Securing transactions now means not only having to secure the server side but also now monitor and protect the consumer’s web browser from ‘bespoke software’ they have pushed out. And getting the bespoke software (e.g., JavaScript) for the client web browser from a third party does not relieve the payment collector from having to monitor and protect it. Attempting to finger-point back to the source will get you nowhere with the auditor.

So, what are the requirements for client-side bespoke software? From section 6.4.1, it comes down to this:

All payment page scripts that are loaded and executed in the consumer’s browser are managed as follows:

  • A method is implemented to confirm that each script is authorized.
  • A method is implemented to assure the integrity of each script.
  • An inventory of all scripts is maintained with written justification as to why each is necessary.

This means that all software (scripts) pushed out must be inventoried, justified, and monitored with a game plan to remediate if a breach is identified. Is your app/IT security staff ready to manage, monitor, and report on this requirement? Have you and your team had a conversation with your PCI DSS auditor on scheduling 4.0 compliance review? It’s time to ensure that your security and PCI DSS compliance plan is on track and not a disruptor to your security operations and—more importantly—your organization’s revenue collection too. Because securing the client-side of your transactions to meet PCI DSS 4.0 compliance is much closer than you realize.

Share
Tags: 2024

About the Author

Related Blog Posts

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5 Ecosystem | 10/28/2025

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture

F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.

F5 Silverline Mitigates Record-Breaking DDoS Attacks
F5 Ecosystem | 08/26/2021

F5 Silverline Mitigates Record-Breaking DDoS Attacks

Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.

F5 Silverline: Our Data Centers are your Data Centers
F5 Ecosystem | 06/22/2021

F5 Silverline: Our Data Centers are your Data Centers

Customers count on F5 Silverline Managed Security Services to secure their digital assets, and in order for us to deliver a highly dependable service at global scale we host our infrastructure in the most reliable and well-connected locations in the world. And when F5 needs reliable and well-connected locations, we turn to Equinix, a leading provider of digital infrastructure.

Volterra and the Power of the Distributed Cloud (Video)
F5 Ecosystem | 04/15/2021

Volterra and the Power of the Distributed Cloud (Video)

How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

The Internet of (Increasingly Scary) Things
F5 Ecosystem | 12/16/2015

The Internet of (Increasingly Scary) Things

There is a lot of FUD (Fear, Uncertainty, and Doubt) that gets attached to any emerging technology trend, particularly when it involves vast legions of consumers eager to participate. And while it’s easy enough to shrug off the paranoia that bots...

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us