PCI SSC Announces Changes to the SAQ A

Alastair Stewart
|
Senior Consultant at URM
|
PUBLISHED on
10
March
2025

Nearly two years ago, v4.0 of the Payment Card Industry Data Security Standard (PCI DSS) was released, introducing numerous new requirements.  For the first two years,  these requirements have remained optional, but their mandatory enforcement date is now rapidly approaching.  As of 31 March 2025, all new requirements will become compulsory.  Additionally, the new version of the PCI DSS saw the introduction of a revised set of self-assessment questionnaires (SAQs) to incorporate any relevant new requirements. (For more information on the changes to SAQs and assessments, read our blog on Preparing for a PCI DSS v4 Assessment).

Since the new documentation was released, the PCI SSC has made a minor revision of the Standard to v4.0.1, but this was only minor grammatical corrections and typo fixes.  New versions of all the SAQs were then released to incorporate those changes in October 2024.  However, on 30 January 2025 the PCI Security Standards Council (SSC) unexpectedly published an updated version of just SAQ-A, with some fairly significant changes.  The Council removed two of the new v4 requirements from the SAQ (6.4.3 and 11.6.1) and added a new bullet point to the eligibility criteria to replace them.

The Significance of SAQ-A

In the modern business landscape, nearly every merchant has an ecommerce payment channel through their website, and the SAQ-A is one of only 3 SAQs that can be used for ecommerce channels (the others being SAQ-A-EP and SAQ-D).  More significantly, it is by far the smallest of the three; the current version includes only 31 requirements, whereas the SAQ-A-EP has 151 and the SAQ-D includes all of them.

The simplicity and relatively lower compliance burden of SAQ-A make it the most sought-after SAQ among merchants and probably the most widely used.  So, when v4 of the Standard was released, and the PCI SSC introduced two of the headline new requirements to SAQ-A, 6.4.3 – (All payment page scripts must be authorised, justified, and integrity checked) and 11.6.1 – (You must deploy change detection on the headers and contents of all payment pages), it had a significant impact on merchants utilising this streamlined compliance path.

Industry Reactions

Both new requirements are very technical and demand significant resources to implement, either utilising internal resources or by leveraging a suitable third-party solution.  However, this introduction was generally well-received within the industry, as many payment pages are vulnerable to the types of attacks these requirements aim to mitigate.  Here at URM, we have spent the past two years working with most of our clients to help them implement suitable processes to meet these requirements.

So, when the PCI SSC unexpectedly announced the removal of these requirements from, arguably, the SAQ that needed them the most, it came as a surprise.  The reaction has been mixed; some organisations that were struggling to meet the new requirements are relieved, but others that have spent significant time and resources implementing solutions are now wondering if they have wasted their time and effort.  Whilst both responses are understandable, they may be misplaced due to the addition of the new eligibility criteria.

The New Eligibility Criteria Explained

Each of the SAQs contains a list of criteria that you must meet in order to use that SAQ.  This ensures any requirements that have been excluded from the specific SAQ are genuinely irrelevant to your organisation.  The newly added criterion in SAQ-A requires merchants to ‘confirm their site is not susceptible to attacks from scripts that could affect the merchant’s e-commerce system(s)’.

This means that while the specific technical requirements (6.4.3 and 11.6.1) were removed, merchants are still responsible for ensuring their sites are protected from script-based attacks.  This clearly indicates that the PCI SSC does not view these requirements as unnecessary.  Instead, the addition of this new eligibility criterion reinforces the importance of securing payment pages against such threats, placing the responsibility back on merchants to demonstrate that their sites are not at risk.

Demonstrating PCI DSS Compliance

So, how do you meet this new criterion to ensure your organisation can still use SAQ-A, i.e., how do you confirm your site is not susceptible to attacks from scripts?  The most obvious way would be to comply with the requirements that were removed.  As such, if you have spent time and resources meeting them, these efforts have not been wasted  as they remain the most effective way to demonstrate your site is secure.  However, the key change is that merchants now have some flexibility.  If you have an alternative, innovative method to prove that your site is protected from script-based attacks, it could also be acceptable under the new eligibility criteria.

Closing Thoughts

Whilst the PCI SSC has removed requirements 6.4.3 and 11.6.1 from SAQ-A, the introduction of the new eligibility criteria makes it clear that the security of merchants’ payment pages remains a priority.  Script-based attacks continue to pose a significant threat, and organisations that have already implemented the removed requirements will not only be well-positioned to meet the new criteria but will also strengthen their overall security posture against these risks.  If, however, you had not yet implemented the new requirements, this update to SAQ-A enables you to find a means of protecting your site against these attacks that is effective and appropriate for your organisation’s specific needs.  At the same time though, you must be certain when you complete SAQ-A that you have met this new criterion sufficiently, or your PCI DSS compliance could be invalid.

How URM can Help

Consultancy

As a PCI Qualified Security Assessor Company (QSAC), URM is the ideal partner to help guide your organisation through its PCI DSS transition journey, or to certifying against the Standard for the first time.  Our team of consultants offer a range of services to help you prepare for your PCI DSS assessment, such conducting a gap analysis of your current cardholder processing practices against the requirements of the Standard.  We can also provide PCI DSS scope reduction services, whereby we suggest a range of appropriate segmentation options for you to consider following a thorough review of your data flow and payment channels.  Following the gap analysis and having identified the most applicable assessment scope, URM’s expert can support your completion of the PCI DSS implementation and remediation activities necessary for you to achieve compliance.  

Assessment and auditing

As well as helping you prepare for a successful assessment, our QSAs can facilitate the assessment itself, offering a range of PCI DSS audit services.  These include a pre-audit readiness assessment, QSA-led PCI Report on Compliance (RoC), QSA supported SAQs and advising you on SAQs you are completing yourself.  Once you are certified, we can conduct regular penetration testing and vulnerability scanning in line with the Standard’s requirements to assess your network infrastructure and applications.

Alastair Stewart
Senior Consultant at URM
Alastair is one of the most experienced and proficient Payment Card Industry Qualified Security Assessors (PCI QSAs) in the UK. He has completed in excess of one hundred successful reports on compliance (RoCs) against different PCI DSS versions along with supporting the completion of self-assessment questionnaires (SAQs).
Read more

Are you looking for a PCI QSA?

As a long-established PCI QSA, URM is able to deliver a full PCI QSA-led audit and produce a report on compliance (RoC) as well as deliver a full QSA-led self-assessment questionnaire (SAQ)
Thumbnail of the Blog Illustration
Information Security
Published on
5/8/2022
What Are the Merchant Levels

We are often asked, both by those new to PCI DSS and those who have been involved for a while....

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
5/8/2022
Can I Store Cardholder Data?

In this article, we aim to clarify what requirements the Payment Card Industry Data Security Standard (PCI DSS) places around....

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
4/6/2024
PCI DSS v4.0: Targeted Risk Analysis

URM’s blog dissects the new PCI DSS requirements around targeted risk analysis, what they involve, and how the 2 types of TRA in the Standard differ.

Read more
It is the calibre of its consultants, be they risk managers, penetration testers, GDPR specialists, Cyber Essentials assessors, ISO 27001 implementers and auditors, combined with its Abriska risk management software, that sets URM apart from its competitors.
The Owners and Distributors of Quality Brands
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.