Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • The Hacker News
  • What PCI DSS v4 Really Means – Lessons from A&F Compliance Journey
  • The Hacker News

What PCI DSS v4 Really Means – Lessons from A&F Compliance Journey

[email protected] The Hacker News Published: March 7, 2025 | Updated: March 7, 2025 4 min read
0 views

Mar 07, 2025The Hacker NewsPayment Security / Compliance

Access on-demand webinar here

Avoid a $100,000/month Compliance Disaster

March 31, 2025: The Clock is Ticking. What if a single overlooked script could cost your business $100,000 per month in non-compliance fines? PCI DSS v4 is coming, and businesses handling payment card data must be prepared.

Beyond fines, non-compliance exposes businesses to web skimming, third-party script attacks, and emerging browser-based threats.

So, how do you get ready in time?

Reflectiz sat down with Abercrombie & Fitch (A&F), for a no-holds-barred discussion about the toughest PCI DSS v4 challenges.

Kevin Heffernan, Director of Risk at A&F, shared actionable insights on:

  • What worked (and saved $$$)
  • What didn’t (and cost time & resources)
  • What they wish they had known earlier

➡ Watch the Full PCI DSS v4 Webinar Now

(Free On-Demand Access – Learn from A&F’s Compliance Experts)

What’s Changing in PCI DSS v4.0.1?

PCI DSS v4 introduces stricter security standards—especially for third-party scripts, browser security, and continuous monitoring. Two of the biggest challenges for online merchants are requirements 6.4.3 and 11.6.1.

Requirement 6.4.3 – Payment Page Script Security

Most businesses rely on third-party scripts for checkout, analytics, live chat, and fraud detection. But attackers exploit these scripts to inject malicious code into payment pages (Magecart-style attacks).

New PCI DSS v4 mandates:

Script Inventory – Every script loaded in a user’s browser must be logged and justified.

Integrity Controls – Businesses must verify the integrity of all payment page scripts.

Authorization – Only approved scripts should execute on checkout pages.

How A&F Tackled It:

  • Conducted script audits to identify unnecessary or risky third-party dependencies.
  • Used Content Security Policy (CSP) to restrict third-party scripts.
  • Utilized smart automated approvals to save time and money.

Requirement 11.6.1 – Change & Tamper Detection

Even if your scripts are secure today, attackers can inject malicious changes later.

New PCI DSS v4 mandates:

Mechanism – Continuous change and tamper detection mechanism deployment for payment page script changes.

Unauthorised changes – HTTP header monitoring to detect unauthorized modifications.

Integrity – Weekly integrity checks (or more frequently based on risk levels and indicators of compromise).

How A&F Tackled It:

  • Deployed continuous monitoring to detect unauthorized modifications.
  • Used Security Information and Event Management (SIEM) for centralized monitoring.
  • Created automated alerts and batch-approval for script, structure and header changes on checkout pages.

Try the Reflectiz PCI Dashboard – Free 30-Day Trial

Recent Update: The SAQ A Exemption Clarification

A recent clarification from the PCI council states the following regarding SAQ A marchants [self-assessment questionnaire]:

  1. Eligibility Requirement: Merchants must confirm their site is not susceptible to script attacks affecting e-commerce systems.
  2. Compliance Options:
    • Implement protection techniques (like those in PCI DSS Requirements 6.4.3 and 11.6.1) either directly or through a third party
    • OR obtain confirmation from PCI DSS-compliant service providers that their embedded payment solution includes script attack protection
  3. Limited Applicability: The criteria only applies to merchants using embedded payment pages/forms (e.g., iframes) from third-party service providers.
  4. Exemptions: Merchants who redirect customers to payment processors or fully outsource payment functions are not subject to this requirement.
  5. Recommendations: Merchants should consult with their service providers about secure implementation and verify with their acquirer that SAQ A is appropriate for their environment.

Note that even if you qualify for SAQ A, your entire website must still be secured. Many businesses will still need real-time monitoring and alerts, making full compliance solutions relevant regardless.

A&F’s Top 3 PCI DSS v4 Pitfalls (And How to Avoid Them)

With multiple payment pages to secure across the globe, Abercrombie and Fitch’s compliance journey was complex. Kevin Heffernan, Director of Risk, has suggested three main mistakes that online merchants often make.

Mistake #1: Relying only on CSP

While Content Security Policy (CSP) helps prevent script-based attacks, it doesn’t cover dynamic changes in scripts or external resources. PCI DSS requires additional integrity verification.

Mistake #2: Ignoring Third-Party Vendors

Most retailers rely on external payment gateways, chat widgets, and tracking scripts. If these vendors don’t comply, you’re still responsible. Regularly audit third-party integrations.

Mistake #3: Treating Compliance as a One-Time Fix

PCI DSS v4 mandates ongoing monitoring—meaning you can’t just audit scripts once and forget about it. Continuous monitoring solutions will be critical for compliance.

Try the Reflectiz PCI Dashboard for 30 day free-trial.

Final Takeaways from A&F’s PCI Compliance Journey

  • Risk Assessment First – Identify and map vulnerabilities, supply chain risks, and components’ misconfigurations before jumping into compliance changes.
  • Secure Your Payment Page Scripts – Configure strict HTTP security headers, such as CSP.
  • Monitor Continuously – Use continuous monitoring, SIEM, and tamper detection alerts to catch modifications before attackers exploit them.
  • Don’t Assume Vendors Have You Covered – Audit third-party scripts and integrations—compliance responsibility doesn’t stop at your firewall.

The March 31st 2025 Deadline is Closer Than You Think

Waiting too long to start creates security gaps and risks costly fines. A&F’s experience shows why early preparation is critical.

➡ Avoid Costly PCI Fines – Watch the PCI DSS v4 Webinar Now to learn how a major global retailer tackled compliance—and what you can do today to avoid fines and security risks.

Try the Reflectiz PCI Dashboard for 30 day free-trial.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

About The Author

[email protected] The Hacker News

See author's posts

Original post here

What do you feel about this?

  • The Hacker News

Post navigation

Previous: Medusa Ransomware Attacks Increase
Next: New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance

Author's Other Posts

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Related Stories

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
nist-cve.jpg
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

[email protected] The Hacker News April 17, 2026 0 1
europol.jpg
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

[email protected] The Hacker News April 17, 2026 0 0

Trending Now

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions nist-cve.jpg 5
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

April 17, 2026 0 1
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts europol.jpg 6
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

April 17, 2026 0 0
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation apachemq.jpg 7
  • The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

April 17, 2026 0 0

You may have missed

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
Copyright © 2026 All rights reserved. | MoreNews by AF themes.