PCI DSS v4.0 marks the first major update to the Standard in over a decade and is now fully in effect, which has meant a lot of updates, and a lot of new requirements added to the Standard. Of the 64 new requirements, 51 are future-dated and will be effective as of 31 March 2025. And now, PCI DSS v4.0.1 was released as a limited revision in June 2024 with minor updates and to provide further clarification and guidance for the requirements.
PCI DSS 6.3.2 requires organizations to maintain an up-to-date inventory of all bespoke and custom software, including any third-party software components integrated into that custom software. In other words, for every in-house or custom application in the cardholder data environment, you need to know exactly what’s inside it – from custom-developed code to open-source libraries, APIs, runtime platforms, and other dependencies. This inventory is essentially a Software Bill of Materials for your in-scope applications. The goal is to facilitate vulnerability and patch management by ensuring no component is overlooked.
This is a new requirement in v4.0 and was designated a best practice until March 31, 2025, after which it becomes fully required. The future-dated timeline underscores the significance of the change – firms are expected to use the run-up period to implement processes and tools for tracking software components. By maintaining an SBOM for each custom application, organizations can quickly identify if a newly disclosed vulnerability (for example, in a popular open-source library like lLog4j) is present in their environment, and then take action to remediate or patch it.
What does an SBOM for PCI DSS include? At minimum, it should list all custom applications and all components within those applications, whether first-party or third-party. This includes things like external libraries, frameworks, modules, APIs used, and even the underlying platforms or services the software relies on. The PCI DSS testing procedures for 6.3.2 make it clear that assessors will expect to see a documented inventory and will verify it against the software in use. In fact, testing procedure 6.3.2.a notes that “the inventory is used to identify and address vulnerabilities”, meaning it’s not enough to just catalog components – you must actively use this SBOM in your vulnerability management program. The SBOM should be kept current (e.g. updated when software is updated) and should be leveraged to track the patch status or known vulnerabilities of each component.
Implementation Tip: To comply with 6.3.2, organizations should establish a process (potentially using automated Software Composition Analysis tools) to generate and maintain SBOMs for all custom applications. Ensure that for each SBOM entry (each component) there is a mapped owner or process to monitor for vulnerabilities and apply updates. This could involve:
PCI DSS has long required regular internal and external vulnerability scans (Requirement 11.3.1 and 11.3.2). In PCI DSS 4.0, Requirement 11.3.1.1 is a new control that ensures a more comprehensive approach to scan results. In essence, 11.3.1.1 mandates that organizations “manage all other applicable vulnerabilities (those not ranked as high-risk or critical) found during internal vulnerability scans.”. This closes a potential gap where previously an entity might focus only on high-severity findings and neglect medium/low findings. Under 4.0, no discovered vulnerability can be simply ignored; even lower-risk issues need to be evaluated and addressed (through remediation or risk mitigation).
By addressing all vulnerabilities (with priority and timing commensurate with risk), organizations reduce their attack surface and meet the stricter expectations of PCI DSS 4.0. In summary, requirement 11.3.1.1 reinforces that security teams can’t ignore “minor” vulnerabilities – these must be managed, and SBOM-driven visibility can help ensure nothing slips through the cracks.
While PCI DSS 4.0 applies to entities handling card data (merchants, service providers), the PCI Software Security Framework (SSF) is a set of standards aimed at payment software vendors. It includes the Secure Software Standard (for security of payment applications) and the Secure SLC Standard (for the vendor’s secure development lifecycle). SBOM concepts feature prominently here as well, underscoring an industry-wide move toward transparency of software components.
In fact, the PCI Secure Software Standard requires vendors to inventory and manage their software components much like PCI DSS 6.3.2 does. For example, guidance for vendors building web-based payment software calls for maintaining an SBOM of all third-party and open source dependencies. This ensures that software developers track their libraries and frameworks and keep them updated against vulnerabilities. A compliance checklist for PCI Secure Software even explicitly lists: “Maintain a Software Bill of Materials (SBOM) to track all dependencies. Continuously monitor and update third-party libraries.”. The intention is that a payment application submitted for validation under PCI SSF should come with a full inventory of its components and evidence of vulnerability management for those components.
How SBOMs in SSF benefit PCI DSS entities: If you are an entity deploying a payment application that has been validated under PCI’s Secure Software Program, you should receive documentation from the vendor about the software’s components (effectively an SBOM) and known vulnerabilities. PCI DSS v4.0 even includes Appendix F to describe how using software developed per the PCI Secure Software Standard can help meet PCI DSS Requirement 6 controls. In other words, a PCI-validated payment software product is expected to adhere to secure design practices – including supply chain security – thereby assisting the entity in complying with requirements like 6.3.2. The Council is actively encouraging this synergy. For instance, at the 2024 PCI Community Meeting, a session titled “You Dropped a ‘BOM’ on me, baby…” was dedicated to the role of software BOMs and how the PCI SSF leverages them now and will in the future. This shows that going forward, SBOMs will likely become even more formalized in the PCI Secure Software Program.
For software vendors: Embracing SBOMs is not just about compliance but also market expectation. Vendors should build the capability to produce SBOMs for their products and share them with clients. Not only will this help your customers meet PCI DSS 4.0 (they can plug your SBOM into their 6.3.2 inventory and use it for their 11.3.1.1 vulnerability management), but it also demonstrates transparency and due diligence in your secure development practices. Many security-conscious customers now expect SBOMs as part of software procurement due to broader supply-chain initiatives and regulations.
Implementing SBOM practices for PCI compliance may seem daunting, but it can be broken down into manageable steps. Here are some actionable insights for technical teams:
Organizations should take advantage of the transition period before March 2025 to get these processes in place. Start by building SBOMs for your applications and integrating them with your vulnerability management workflow. If you’re a software vendor in the payments space, align with PCI SSF expectations now – it not only prepares you for potential future validation, but also makes your product more trustworthy to clients who must meet PCI DSS. The PCI Security Standards Council’s guidance and resource hub provide clarity on these new controls, and it’s clear that SBOMs are here to stay as a foundational element of software security compliance.
By approaching SBOM requirements as an opportunity to strengthen software governance, developers and cybersecurity professionals can both meet PCI DSS 4.0/SSF obligations and significantly reduce risk in their environments. In the end, an up-to-date SBOM coupled with diligent vulnerability management is a powerful tool to protect cardholder data in today’s complex ecosystem of software and services.
We shortened our vulnerability review timeframe from a day to under an hour. It is our go-to tool and we now know where to focus our limited security resources next.
SBOM Studio saves us approximately 500 hours per project on vulnerability analysis and prioritization for open-source projects.