- Report this article
Narendra Sahoo
Narendra Sahoo
PCI QSA, PCI SSA, PCI QPA, CISSP, CISA, CRISC, CEH, ISO27001 LA - Director, VISTA InfoSec
Published Sep 4, 2023
+ Follow
PCI DSS Requirement 4 states that organizations must "transmit cardholder data by encrypting it over open, public networks." This means that any time cardholder data is sent over the internet, it must be encrypted using a secure encryption protocol.
There are a number of different encryption protocols that can be used to meet PCI DSS Requirement 4. Some of the most common protocols include:
When choosing an encryption protocol, it is important to consider the following factors:
Once an encryption protocol has been chosen, it is important to implement it correctly and to ensure that it is used consistently. This can be done by following the guidance provided by the PCI Security Standards Council.
Watch our video on PCI DSS Requirement 4 : Summary of Changes from Version 3.2.1 to 4.0 Explained
Recommended next reads
Organizations that fail to comply with PCI DSS Requirement 4 could face a number of consequences, including:
It is therefore important for organizations to take steps to ensure that they are compliant with PCI DSS Requirement 4.
Here are some additional tips for complying with PCI DSS Requirement 4:
By following these tips, you can help to protect your organization from the risks associated with transmitting cardholder data over open, public networks.
Cybersecurity News Updates
Cybersecurity News Updates
55,849 followers
+ Subscribe
To view or add a comment, sign in
More articles by this author
No more previous content
- 10 Key GDPR Requirements Apr 25, 2024
- Hackers can read your encrypted AI-assistant chats Apr 18, 2024
- A06 Vulnerable and Outdated Components Apr 15, 2024
- Preparing for PCI SSF Assessments and Audits: Tips and Strategies Apr 12, 2024
- Demystifying PCI SSF Assessments: Gaining Control and Achieving Compliance Apr 5, 2024
- Preparing for PCI SSF Assessments and Audits: Tips and Strategies Mar 28, 2024
- Missed Our HIPAA Risk Assessment Webinar? Catch the Replay Now! Mar 27, 2024
- Two Million Brits Victims of Financial Identity Fraud Feb 19, 2024
- Free Webinar - HIPAA Risk Assessment: Turn Threats into Opportunities for Stronger Compliance Feb 16, 2024
- Devastating Crypto Failures: Are You at Risk? Feb 15, 2024
No more next content
Sign in
Stay updated on your professional world
Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Insights from the community
- 3GPP How do you implement and verify 3GPP NAS and MM security features and algorithms?
- Computer Hardware Troubleshooting What are the security risks and benefits of using encrypted storage devices?
- Local Area Network (LAN) What are the pros and cons of using symmetric and asymmetric encryption for LAN security?
- Computer Science What is the best way to ensure that cryptographic keys are securely generated and stored in software systems?
- System Architecture How can you best protect encryption keys for data at rest?
- Algorithms What is the most effective way to secure a cryptographic key?
- IT Security Operations What are the best practices for encrypting data at rest and in transit?
- Internet Protocol Suite (TCP/IP) What are the common misconceptions and myths about TCP/IP encryption and authentication?
- Computer Science What are the top practices to secure data in transit?
- TV Production How do you encrypt and backup your TV production data?
Others also viewed
- Kerberos - Is it good or bad ? Sanjai Kannan 1mo
- PIN Block Part II Siddhiganesh Joshi 1y
- Newsletter October 2022 JISA Softech Private Limited 1y
- PCI road map to bypass SSL Dale Laszig 7y
- Encryption within encryption, how much security does it really offer? Gayathri Sundar 5y
- RC4 CIPHER Venkata Siva Naga Sai Kota 2y
- Symmetric Encryption vs Asymmetric Encryption Ahmed Hassan 11mo
- The Top 8 Things You Need to Know About TLS 1.2 Anati Zubia 6y
- PRESINT's Byte of The Week: The CIA Triad Preston Buchanan 1mo
- The Multi-Cloud Era Creates New Encryption Challenges John Grimm 6y