Nearly two years ago, v4.0 of the Payment Card Industry Data Security Standard (PCI DSS) was released, introducing numerous new requirements. For the first two years, these requirements have remained optional, but their mandatory enforcement date is now rapidly approaching. As of 31 March 2025, all new requirements will become compulsory. Additionally, the new version of the PCI DSS saw the introduction of a revised set of self-assessment questionnaires (SAQs) to incorporate any relevant new requirements. (For more information on the changes to SAQs and assessments, read our blog on Preparing for a PCI DSS v4 Assessment).
Since the new documentation was released, the PCI SSC has made a minor revision of the Standard to v4.0.1, but this was only minor grammatical corrections and typo fixes. New versions of all the SAQs were then released to incorporate those changes in October 2024. However, on 30 January 2025 the PCI Security Standards Council (SSC) unexpectedly published an updated version of just SAQ-A, with some fairly significant changes. The Council removed two of the new v4 requirements from the SAQ (6.4.3 and 11.6.1) and added a new bullet point to the eligibility criteria to replace them.
The Significance of SAQ-A
In the modern business landscape, nearly every merchant has an ecommerce payment channel through their website, and the SAQ-A is one of only 3 SAQs that can be used for ecommerce channels (the others being SAQ-A-EP and SAQ-D). More significantly, it is by far the smallest of the three; the current version includes only 31 requirements, whereas the SAQ-A-EP has 151 and the SAQ-D includes all of them.
The simplicity and relatively lower compliance burden of SAQ-A make it the most sought-after SAQ among merchants and probably the most widely used. So, when v4 of the Standard was released, and the PCI SSC introduced two of the headline new requirements to SAQ-A, 6.4.3 – (All payment page scripts must be authorised, justified, and integrity checked) and 11.6.1 – (You must deploy change detection on the headers and contents of all payment pages), it had a significant impact on merchants utilising this streamlined compliance path.
Industry Reactions
Both new requirements are very technical and demand significant resources to implement, either utilising internal resources or by leveraging a suitable third-party solution. However, this introduction was generally well-received within the industry, as many payment pages are vulnerable to the types of attacks these requirements aim to mitigate. Here at URM, we have spent the past two years working with most of our clients to help them implement suitable processes to meet these requirements.
So, when the PCI SSC unexpectedly announced the removal of these requirements from, arguably, the SAQ that needed them the most, it came as a surprise. The reaction has been mixed; some organisations that were struggling to meet the new requirements are relieved, but others that have spent significant time and resources implementing solutions are now wondering if they have wasted their time and effort. Whilst both responses are understandable, they may be misplaced due to the addition of the new eligibility criteria.
The New Eligibility Criteria Explained
Each of the SAQs contains a list of criteria that you must meet in order to use that SAQ. This ensures any requirements that have been excluded from the specific SAQ are genuinely irrelevant to your organisation. The newly added criterion in SAQ-A requires merchants to ‘confirm their site is not susceptible to attacks from scripts that could affect the merchant’s e-commerce system(s)’.
This means that while the specific technical requirements (6.4.3 and 11.6.1) were removed, merchants are still responsible for ensuring their sites are protected from script-based attacks. This clearly indicates that the PCI SSC does not view these requirements as unnecessary. Instead, the addition of this new eligibility criterion reinforces the importance of securing payment pages against such threats, placing the responsibility back on merchants to demonstrate that their sites are not at risk.
Demonstrating PCI DSS Compliance
So, how do you meet this new criterion to ensure your organisation can still use SAQ-A, i.e., how do you confirm your site is not susceptible to attacks from scripts? The most obvious way would be to comply with the requirements that were removed. As such, if you have spent time and resources meeting them, these efforts have not been wasted as they remain the most effective way to demonstrate your site is secure. However, the key change is that merchants now have some flexibility. If you have an alternative, innovative method to prove that your site is protected from script-based attacks, it could also be acceptable under the new eligibility criteria.
Closing Thoughts
Whilst the PCI SSC has removed requirements 6.4.3 and 11.6.1 from SAQ-A, the introduction of the new eligibility criteria makes it clear that the security of merchants’ payment pages remains a priority. Script-based attacks continue to pose a significant threat, and organisations that have already implemented the removed requirements will not only be well-positioned to meet the new criteria but will also strengthen their overall security posture against these risks. If, however, you had not yet implemented the new requirements, this update to SAQ-A enables you to find a means of protecting your site against these attacks that is effective and appropriate for your organisation’s specific needs. At the same time though, you must be certain when you complete SAQ-A that you have met this new criterion sufficiently, or your PCI DSS compliance could be invalid.
How URM can Help
Consultancy
As a PCI Qualified Security Assessor Company (QSAC), URM is the ideal partner to help guide your organisation through its PCI DSS transition journey, or to certifying against the Standard for the first time. Our team of consultants offer a range of services to help you prepare for your PCI DSS assessment, such conducting a gap analysis of your current cardholder processing practices against the requirements of the Standard. We can also provide PCI DSS scope reduction services, whereby we suggest a range of appropriate segmentation options for you to consider following a thorough review of your data flow and payment channels. Following the gap analysis and having identified the most applicable assessment scope, URM’s expert can support your completion of the PCI DSS implementation and remediation activities necessary for you to achieve compliance.
Assessment and auditing
As well as helping you prepare for a successful assessment, our QSAs can facilitate the assessment itself, offering a range of PCI DSS audit services. These include a pre-audit readiness assessment, QSA-led PCI Report on Compliance (RoC), QSA supported SAQs and advising you on SAQs you are completing yourself. Once you are certified, we can conduct regular penetration testing and vulnerability scanning in line with the Standard’s requirements to assess your network infrastructure and applications.
If your organisation has received a request for a SOC 2 report and is looking to meet all the necessary requirements, URM can offer you informed guidance and practical support.
URM can help you achieve ISO 27001 certification
URM can provide a range of ISO 27002:2022 transition services including conducting a gap analysis, supporting you with risk assessment and treatment activities as well as delivering a 2-day transition training course.

We are often asked, both by those new to PCI DSS and those who have been involved for a while....

In this article, we aim to clarify what requirements the Payment Card Industry Data Security Standard (PCI DSS) places around....

URM’s blog dissects the new PCI DSS requirements around targeted risk analysis, what they involve, and how the 2 types of TRA in the Standard differ.