The most significant change in v4.0 is the mandate for continuous monitoring of e-commerce payment pages against malicious script injection, commonly known as Magecart attacks. Where the old standard allowed organizations to scan periodically, v4.0 requires active, ongoing detection. The implication is stark: if you run an online store and you are not monitoring your checkout page in real time, you are not compliant — and you are a live target.
Multi-factor authentication requirements were also hardened. Previously, MFA was required primarily for remote access into the cardholder data environment. Under v4.0, MFA is now required for all access — including internal access — to systems that store, process, or transmit cardholder data. If your internal team accesses your payment systems with a username and password alone, you are out of compliance.
The good news for level 4 merchants — those processing fewer than one million Visa transactions annually — is that much of v4.0 can be addressed through a properly completed SAQ (Self-Assessment Questionnaire) with guidance from a Qualified Security Assessor. You do not need a $50,000 enterprise audit to get compliant. You need a structured gap assessment, a remediation roadmap, and consistent execution.