PCI DSS 4.0.1 future-dated requirements went mandatory on March 31, 2025. Here is the 2026 checklist for high-risk merchants — SAQs, scope reduction, and the new MFA and script-integrity rules.
PCI DSS 4.0.1 is now the only enforced standard. Version 3.2.1 retired December 31, 2024, and the future-dated 4.0.1 requirements went fully mandatory on March 31, 2025. If you are a high-risk merchant and you have not updated your Self-Assessment Questionnaire in the last 12 months, you are out of compliance.
This article is the practical 2026 checklist for what actually changed and what high-risk merchants need to do. Our processing partners are PCI-DSS Level 1 compliant, and we help placed merchants navigate their own merchant-level attestation every year.
PCI DSS applies to every entity that stores, processes, or transmits cardholder data. Your compliance obligation depends on your annual transaction count (Level 1 through 4) and your acceptance channel (e-commerce, in-person, phone).
Most high-risk merchants are Level 3 or Level 4 and complete SAQ A, A-EP, or D depending on their integration.
The 2026 practical rule: pick your SAQ based on what JavaScript is on your checkout page, not what you think your architecture looks like. If your page loads any script that touches a payment field, you are SAQ A-EP minimum.
Version 4.0.1 introduced 64 new requirements, 51 of which became mandatory March 31, 2025. The ones that matter most for high-risk merchants:
These two requirements are the 2025-2026 compliance headache. They target Magecart-style skimmer attacks where a third-party script is modified to exfiltrate cardholder data.
What you need to do as a merchant accepting card-not-present payments:
Merchants fully using iframe/redirect to Authorize.Net Accept Hosted, Stripe Checkout, or NMI Collect.js meet this requirement because the payment fields are hosted by the PCI-compliant processor. Merchants using in-line fields (Stripe Elements on your own page) are responsible for the script integrity controls themselves.
Old rule: MFA for admin access to the cardholder data environment. New rule: MFA for all access, including user access. If your checkout portal, admin dashboard, or payment integration has any user login that touches card data, MFA is mandatory.
Practical implementation: TOTP (Google Authenticator, Authy), hardware keys (YubiKey), or biometric. SMS MFA is explicitly no longer considered strong enough for PCI purposes.
The cheapest way to comply is to have as little scope as possible. Three patterns reduce scope dramatically:
Our processing partners are PCI-DSS Level 1 compliant, which means your integration into their hosted pages and tokenization APIs minimizes your own compliance scope. We provide referrals to ASVs and QSAs for merchants who need annual scans and attestation. We also help structure integrations (iframe, redirect, Collect.js) that land you in SAQ A or SAQ A-EP instead of SAQ D. applications processed, 755 industries, 4.9/5 across verified customer reviews.
No. Stripe and Square handle their portion of the card data environment but you still have to attest annually with the SAQ that matches your integration. Using these processors reduces scope (often to SAQ A) but does not eliminate your compliance obligation.
SAQ A merchants spend $50-$200 per year on attestation-only services. SAQ A-EP or C with quarterly ASV scans runs $500-$2,000. Level 2+ with a QSA-led ROC can cost $15,000-$50,000 or more.
If the payment link redirects the customer entirely to a hosted payment page (Stripe Checkout link, for example), you typically qualify for SAQ A. You still complete the SAQ annually — just with fewer requirements.
4.0.1 is a maintenance update released June 2024. It clarifies requirements and fixes errata from 4.0 but adds no new controls. If you comply with 4.0.1 you comply with the full 4.0 family. Version 3.2.1 is retired.
Yes. If your receipts show more than the last 4 digits of the PAN, you are out of compliance. Truncate all printed receipts to mask the PAN (show only last 4) and do not print the full expiration date.
Cybin Enterprises is a payment services intermediary specializing in high-risk merchant accounts. Our team brings decades of experience in payment processing, compliance, and risk management.
Expertise: High-risk underwriting, payment compliance, chargeback management, multi-processor routing
Understanding the factors that classify a business as high-risk is the first step to securing stable payment processing.
Chargeback disputes can threaten your merchant account. Discover how early dispute alert systems help merchants resolve issues before they escalate.
Whether you're dealing with account termination or launching a new high-risk business, we can help you secure stable payment processing.