PCI DSS 4.0.1 · Payment Card Industry Security Standards Council
PCI DSS 4.0.1 on AWS — Scope Reduction Before Compliance
PCI DSS 4.0.1 enforced from 31 March 2025. The audit fails on scope, not technical controls. We reduce the cardholder data environment first, then implement controls — so your QSA reviews 30% of the surface area instead of 100%.
Scope: Any organization that stores, processes, or transmits cardholder data — typical for fintechs, payment processors, e-commerce platforms, and card-on-file SaaS.
Part of the AWS Security & Compliance hub .
Who needs this
Teams that typically engage on PCI DSS 4.0.1 on AWS
E-commerce platforms storing card-on-file or processing recurring payments
SaaS platforms that touch primary account numbers (PANs) even briefly
Companies migrating off legacy payment infrastructure to AWS-native architectures
Shared Responsibility
AWS Shared Responsibility for PCI DSS 4.0.1 on AWS
What AWS does, what you do, and where the line moves under this specific framework.
AWS owns
- AWS publishes its PCI DSS 4.0.1 Attestation of Compliance (AoC) on AWS Artifact — covers AWS as a Level 1 service provider
- AWS Foundational Security Best Practices Security Hub standard maps to PCI DSS controls
- AWS Config publishes a PCI DSS conformance pack for continuous evaluation
Joint
- Vulnerability management — AWS Inspector v2 scans, you triage and remediate by CVSS + KEV
- Network segmentation — AWS provides VPCs, security groups, NACLs, Network Firewall; you design the CDE topology
- Logging and monitoring — AWS provides CloudTrail/CloudWatch; you configure 1-year hot retention + 1-year cold for PCI
You own
- Req 1: Network security controls (segmentation, ingress/egress filtering, no direct internet to CDE)
- Req 2: Secure configuration (CIS AWS Foundations baseline, no defaults, hardened AMIs)
- Req 3: Protect stored account data (tokenization, KMS encryption, key rotation)
- Req 4: Protect data in transit (TLS 1.2+, no unencrypted PAN over public networks)
- Req 5: Anti-malware (GuardDuty Malware Protection, Inspector v2)
- Req 6: Secure development (CodeGuru, Inspector code scanning, peer review, **Req 6.4.3 script integrity** for payment pages)
- Req 7: Restrict access by need-to-know (IAM least privilege, ABAC, no broad IAM:* policies)
- Req 8: Identify users (MFA, no shared accounts, password policy)
- Req 9: Restrict physical access (mostly inherited from AWS)
- Req 10: Log and monitor all access (CloudTrail multi-region with log file validation)
- Req 11: Test security regularly (quarterly external scans, annual penetration testing)
- Req 12: Maintain information security policy
Control-by-control AWS implementation
Each control mapped to the AWS service that satisfies it
Excerpts from the full control matrix we deliver in the engagement. Not exhaustive — your audit scope drives the final mapping.
Requirement 1 — Network Security Controls
Req 1 is where most CDE scope creep originates. Bad segmentation pulls every workload into PCI scope.
| Control | AWS services | Implementation note |
|---|---|---|
| 1.2 Network security controls (NSCs) configured and maintained | VPC Security Groups Network ACLs Network Firewall Firewall Manager | CDE in dedicated VPC; security-group-as-policy enforced via Firewall Manager Org-wide. |
| 1.3 Network access to and from CDE is restricted | Network Firewall (Suricata IPS) AWS PrivateLink Transit Gateway with route filtering | No direct internet ingress to CDE; egress via Network Firewall with stateful domain filtering. |
| 1.4 Network connections between trusted and untrusted networks are controlled | VPC Endpoints (Gateway + Interface) PrivateLink AWS Site-to-Site VPN | AWS-internal CDE traffic stays on PrivateLink; partner connectivity via VPN with IPsec. |
Network security controls (NSCs) configured and maintained
CDE in dedicated VPC; security-group-as-policy enforced via Firewall Manager Org-wide.
Network access to and from CDE is restricted
No direct internet ingress to CDE; egress via Network Firewall with stateful domain filtering.
Network connections between trusted and untrusted networks are controlled
AWS-internal CDE traffic stays on PrivateLink; partner connectivity via VPN with IPsec.
Requirement 6 — Develop and Maintain Secure Systems
PCI DSS 4.0.1 added Req 6.4.3 (script integrity for payment pages) and 11.6.1 (change-and-tamper detection on payment pages) — both enforceable from 31 March 2025.
| Control | AWS services | Implementation note |
|---|---|---|
| 6.2 Bespoke and custom software developed securely | CodeGuru Reviewer Inspector v2 (Lambda code, ECR) Amazon Q Developer (security suggestions) | Static analysis on every PR; ECR image scanning blocks deploys with critical CVEs. |
| 6.3.3 All system components are protected from known vulnerabilities | Inspector v2 Systems Manager Patch Manager AWS Backup | Critical CVEs patched within 30 days; CVSS-and-KEV-aware prioritization. |
| 6.4.3 Scripts on payment pages are managed (NEW in 4.0.1, enforceable 31 March 2025) | AWS WAF managed rules — Common Rule Set + custom JavaScript SRI rules CloudFront Functions for SRI hash validation | Inventory of all scripts on payment pages; integrity check via Subresource Integrity (SRI); change detection via CloudFront log analysis. |
Bespoke and custom software developed securely
Static analysis on every PR; ECR image scanning blocks deploys with critical CVEs.
All system components are protected from known vulnerabilities
Critical CVEs patched within 30 days; CVSS-and-KEV-aware prioritization.
Scripts on payment pages are managed (NEW in 4.0.1, enforceable 31 March 2025)
Inventory of all scripts on payment pages; integrity check via Subresource Integrity (SRI); change detection via CloudFront log analysis.
Requirement 11 — Testing
Req 11.6.1 (payment page tamper detection) added in 4.0.1 — same enforcement date as 6.4.3.
| Control | AWS services | Implementation note |
|---|---|---|
| 11.3.1 External vulnerability scans (quarterly + after significant change) | Approved Scanning Vendor (ASV) on PCI SSC list Inspector v2 for internal | External scans by ASV; internal scans by Inspector v2 with weekly cadence. |
| 11.4 External and internal penetration testing | AWS Penetration Testing program (no pre-approval needed for most services since 2019) | Annual external pen test + segmentation testing; AWS-aware pen test scope (IAM, S3, IMDS, container). |
| 11.6.1 Change-and-tamper detection on payment pages (NEW in 4.0.1) | CloudFront real-time logs CloudWatch Logs Insights Lambda for SRI hash comparison | Weekly automated integrity check on payment-page DOM and headers; alerts on unexpected changes. |
External vulnerability scans (quarterly + after significant change)
External scans by ASV; internal scans by Inspector v2 with weekly cadence.
External and internal penetration testing
Annual external pen test + segmentation testing; AWS-aware pen test scope (IAM, S3, IMDS, container).
Change-and-tamper detection on payment pages (NEW in 4.0.1)
Weekly automated integrity check on payment-page DOM and headers; alerts on unexpected changes.
Evidence pipeline
How PCI DSS 4.0.1 on AWS evidence flows continuously
Audit Manager closed to new customers on 30 April 2026. Our pipeline is what we now ship.
AWS Config conformance pack — PCI DSS 4.0
AWS-published conformance pack updated for PCI DSS 4.0; deployable Org-wide.
Security Hub PCI DSS 4.0 standard
AWS Security Hub publishes a PCI DSS 4.0 standard — continuous controls evaluation.
CloudTrail Lake — 1 year hot + 1 year cold
Req 10.5.1 — 1 year of audit log retention with at least 3 months immediately available.
QSA evidence package
Network segmentation diagrams, CDE inventory, IAM least-privilege evidence, encryption proofs — packaged for the QSA fieldwork.
Engagement timeline
What you get, week by week
Date-bound engagement, not an open-ended retainer. Deliverables are itemised in the SOW.
- CDE inventory — every system that stores, processes, or transmits PAN
- Scope reduction plan — tokenization candidates, segmentation moves, third-party hosted payment fields
- PCI level confirmation (Level 1, 2, 3, 4) and assessor type (QSA, ISA + SAQ-D)
- Tokenization implementation (typically: stripe.js, Adyen Components, or in-house tokenization service)
- Network segmentation — CDE moved to dedicated VPC + Network Firewall enforcement
- Removal of PAN from logs, backups, analytics pipelines (the largest single source of scope creep)
- Req 6.4.3 script integrity — SRI hash validation, payment page allow-list
- Req 11.6.1 tamper detection — automated DOM and header monitoring
- IAM least privilege for CDE access, MFA enforcement, quarterly access reviews
- WAF + Shield Advanced + GuardDuty + Inspector v2 + Macie deployed
- QSA fieldwork (Level 1) or SAQ-D completion (Level 2)
- Attestation of Compliance (AoC) — distributable to acquiring banks and customers
- Report on Compliance (RoC) for Level 1
Related guides
Deep-dive guides on PCI DSS 4.0.1 on AWS
From inside paid engagements — same patterns, more depth.
PCI DSS Compliance on AWS: Architecture Guide for Fintech
A practical architecture guide for PCI DSS compliance on AWS — CDE scoping, the 12 requirements mapped to AWS services, network design, encryption, logging, and audit readiness for payment-processing applications.
AWS WAF: Web Application Firewall Configuration for Production
AWS WAF blocks attacks. It also blocks legitimate users when the rules are wrong — and that's a worse incident. Managed rule groups, custom rules, rate limiting, bot control, and the layered defense strategy that protects without flooding your support queue.
How to Configure AWS WAF for API Protection (Beyond the Basics)
AWS WAF protects APIs from SQL injection, XSS, DDoS, and account takeover attacks. This guide covers advanced WAF rules, rate limiting, bot control, and production patterns for defending REST APIs and GraphQL endpoints.
Related frameworks
Frameworks that overlap with this one
Multi-framework scope is the norm. Most teams certify on two or three at once.
SOC 2 Type II on AWS
CC1–CC9 trust services criteria mapped to AWS-native controls, evidence pipeline, and a CPA-firm-ready audit package — for SaaS founders facing enterprise procurement.
ISO 27001:2022 on AWS
Annex A.5–A.8 implementation, ISMS scoping, climate-change context (Amendment 1:2024), notified-body audit prep — for SaaS expanding to EU/APAC and regulated B2B vendors.
FAQ
Frequently asked questions about PCI DSS 4.0.1 on AWS
The questions buyers ask before signing — assessor type, timeline, cost, and AWS-specific scope.
How does PCI DSS 4.0.1 differ from 4.0?
What is CDE scope reduction, and why does it matter?
What is the new Req 6.4.3 script integrity requirement?
Do we need a QSA or can we self-assess?
Can we use Stripe / Adyen / Braintree to avoid PCI scope entirely?
How long does PCI DSS Level 1 certification take on AWS?
Book a Free PCI DSS Scoping Assessment
2-week read-only assessment. We map your CDE, identify scope reduction opportunities, and quote the realistic Level 1 or Level 2 timeline. No retainer commitment.