SAQ A-EP is for e-commerce merchants outsource all storage, processing and transmission of account data except that they control the website payment page. If you are using the HBCommerce system, this is your current status.
As with SAQ A, the SAQ A-EP eligibility criteria now requires specific checking of the compliance of TPSPs through their AOCs, and that the AOCs cover services used by the merchant. TPSPs would include the e-commerce payment service providers. Further to that, most new requirements that are significant (signified by an asterisk), and are as follows:
Requirement 3.2.1* adds that merchants are responsible for determining how TPSPs meet this requirement for account data retention. Requirement 3.3 clarifies that SAD storage applies to any account data stored on paper.
Requirement 6.3.2 now requires an inventory of bespoke and custom software and third-party software components.
Requirement 6.4.3* requires that you manage script files like JavaScript that are included on payment pages that the merchant hosts; for example, Google Analytics, third-party advertising scripts, or CDN hosted scripts, are especially important.
Requirement 6.4.2 will require an automated solution to protect web applications such as a web application firewall; this was one of two options in PCI DSS v3.2.1 and becomes the only option from the end of Q1 2025.
Requirement 7.2.4* needs at least six-monthly user account access reviews.
Section 8 now includes a new password and reset password controls in 8.3.5*, as well as a minimum of 12 alphanumeric characters for passwords in 8.3.6*, and MFA enforced for all access to the CDE in 8.4.2*. With e-commerce websites, it is likely that organisations already enforce MFA for all access to the CDE. There are additional requirements for application or system accounts in 8.6 restricting the use of interactive application accounts, no hardcoding of passwords, and periodic changes: again, mandatory from Q1 2025.
Section 9.4 clarifies that media applies to merchants with paper records that may contain account data.
Requirement 10.4.1.1* now requires that automated mechanisms are used to perform audit log reviews, not manual, which is allowed in v3.2.1.
Requirement 11.6.1* needs a change and tamper detection mechanism for the payment pages on the web servers. This requirement needs careful consideration, and there are some solutions described in the guidance column within PCI DSS v4.0 for this requirement.
Requirement 12.3.1* requires targeted risk analysis on any requirement with flexible frequency, such as 5.2.3.1, 5.3.2.1, 8.6.3, 10.4.2.1 and 11.6.1. This requires comprehensive and specific documentation.
Requirement 12.6.3.1* needs security awareness training to include awareness of phishing and social engineering attacks.
Requirement 12.10.1 for an incident response plan has guidance that 12.10.1 means that the merchant has documented an incident response and escalation plan to be used for emergencies, consistent with the size and complexity of the merchant’s operations. 12.10.3 mandates that specific personnel are designated to be available on a 24/7 basis to respond to suspected or confirmed security incidents.