PCI DSS 4.0.1 Controls and Shared Responsibility Mapping

Overview

PCI DSS 4.0 consists of 12 core requirements, each with multiple controls, designed to protect cardholder data. For Ultra Commerce ecommerce platforms, responsibilities for each control are shared among:

  • Ultra Commerce (Platform Provider)

  • AWS (Cloud Service Provider)

  • Customer (Merchant using our platform)

The mapping below provides a high-level responsibility matrix for each requirement, based on the AWS Shared Responsibility Model and PCI DSS guidance.

PCI DSS 4.0.1 Requirements and Responsibility Matrix

Req ID

Requirement

AWS Responsibility

Ultra Commerce Responsibility

Customer Responsibility

1

Install and maintain network security controls

Physical infra, VPC, NSC


Secures the physical network, provides Virtual Private Cloud (VPC), and manages the underlying firewall infrastructure

Configure VPC, security groups, WAF


Configures VPCs, security groups, and network ACLs; manages web application firewalls (WAF) and ensures segmentation of the cardholder data environment (CDE)

Use platform securely

 

Uses the platform securely, avoids risky integrations, and follows best practices for connecting to the platform

2

Apply secure configurations to all system components

Hypervisor, base OS (PaaS)


Manages the hypervisor, base operating system (for managed services), and default configurations for AWS services

Harden OS, apps, containers


Hardens operating systems, applications, and containers; applies secure configurations to all deployed resources

Secure app configs


Ensures any customizations or integrations are securely configured and do not weaken platform security

3

Protect stored account data

Physical Security, KMS, S3 encryption Tools

 

Provides encryption tools (e.g., AWS KMS, S3 encryption) and ensures physical security of storage infrastructure

Not Applicable

 

Ultra Commerce does not currently process or manage any cardholder data (CHD) on its customers behalf

 

Clients are responsible for the management of cardholder data

Data retention, access policies


Customers are responsible for maintaining appropriate data retention policies and procedures, encryption technologies and key management processes for maintaining PCI Data Security Standard requirements

4

Protect cardholder data with strong cryptography during transmission

Network infra, TLS support


Delivers secure network infrastructure and supports TLS for data in transit

Enforce TLS, secure APIs


Enforces TLS for all endpoints, secures APIs, and ensures secure transmission of cardholder data

Use secure endpoints


Connects only via secure endpoints and avoids insecure integrations

5

Protect all systems and networks from malicious software

Infra, managed services


Secures managed infrastructure and provides anti-malware capabilities for managed services

Endpoint protection, patching


Deploys endpoint protection, regularly patches systems, and monitors for malware

Secure endpoints


Ensures their own devices and endpoints are protected when accessing the platform

6

Develop and maintain secure systems and software

Managed services infra


Maintains security of managed service infrastructure and underlying software

SDLC, code review, patching


Follows secure software development lifecycle (SDLC), conducts code reviews, and applies timely patches

Secure customizations


Ensures any custom code or plugins maintained by the customer are securely developed and maintained

7

Restrict access by business need-to-know

IAM infra, root controls


Provides foundational IAM infrastructure and root account controls

Role-based access, least privilege


Implements role-based access, enforces least privilege, and manages user roles within the platform

User access management


Manages their own user access and permissions within the platform

8

Identify and authenticate access to system components

IAM infra, MFA support


Offers IAM, supports multi-factor authentication (MFA), and manages authentication for AWS services

User auth, MFA, logging


Enforces user authentication, MFA, and logs all access to sensitive components

User auth, MFA


Uses strong authentication and MFA for their users and administrators

9

Restrict physical access to cardholder data

Data center security


Ensures physical security of data centers and hardware

Not applicable

Not applicable

10

Log and monitor all access to system components and cardholder data

CloudTrail, CloudWatch


Provides logging services (CloudTrail, CloudWatch) and secures log storage

Log app access, SIEM integration


Integrates application logs, monitors access and connects to SIEM solutions for analysis

Review logs


Reviews log relevant to their own users and activities

11

Test security of systems and networks regularly

Infra vulnerability management


Conducts vulnerability management and security testing for managed infrastructure

Pen testing, vulnerability scans


Performs penetration testing, vulnerability scans, and remediates findings

App-level testing


Tests custom applications or integrations for security issues

12

Support information security with policies and programs

Infra policies


Maintains security policies for its infrastructure and service

Security policies, training


Develops, documents, and enforces security policies; provides staff training and compliance documentation

Security policies


Maintains their own security policies for their users and data, and ensures staff awareness

Key Points

  • AWS is responsible for the security of the cloud (physical, infrastructure, managed services).

  • Ultra Commerce (as the platform provider) is responsible for security in the cloud (configuration, application security, platform controls).

  • Customer (merchant) is responsible for their own data, user access, and any customizations or integrations they perform.

Notes

  • Some requirements (e.g., physical security) are almost entirely AWS’s responsibility unless you use on-premises hardware.

  • Most technical controls are managed by Ultra Commerce, but customers must still manage their own users and data.

  • For detailed control wise responsibilities, refer this spreadsheet.


References

  • PCI DSS v4.0.1 full requirements and guidance

  • AWS PCI DSS v4.0 Compliance Guide

  • PCI DSS Service Provider Controls Matrix best practices.

  • PCI DSS v4.0.1 service provider responsibility requirements.

PCI DSS 4.0.1 Controls and Shared Responsibility Mapping

Overview

PCI DSS 4.0 consists of 12 core requirements, each with multiple controls, designed to protect cardholder data. For Ultra Commerce ecommerce platforms, responsibilities for each control are shared among:

  • Ultra Commerce (Platform Provider)

  • AWS (Cloud Service Provider)

  • Customer (Merchant using our platform)

The mapping below provides a high-level responsibility matrix for each requirement, based on the AWS Shared Responsibility Model and PCI DSS guidance.

PCI DSS 4.0.1 Requirements and Responsibility Matrix

Req ID

Requirement

AWS Responsibility

Ultra Commerce Responsibility

Customer Responsibility

1

Install and maintain network security controls

Physical infra, VPC, NSC


Secures the physical network, provides Virtual Private Cloud (VPC), and manages the underlying firewall infrastructure

Configure VPC, security groups, WAF


Configures VPCs, security groups, and network ACLs; manages web application firewalls (WAF) and ensures segmentation of the cardholder data environment (CDE)

Use platform securely

 

Uses the platform securely, avoids risky integrations, and follows best practices for connecting to the platform

2

Apply secure configurations to all system components

Hypervisor, base OS (PaaS)


Manages the hypervisor, base operating system (for managed services), and default configurations for AWS services

Harden OS, apps, containers


Hardens operating systems, applications, and containers; applies secure configurations to all deployed resources

Secure app configs


Ensures any customizations or integrations are securely configured and do not weaken platform security

3

Protect stored account data

Physical Security, KMS, S3 encryption Tools

 

Provides encryption tools (e.g., AWS KMS, S3 encryption) and ensures physical security of storage infrastructure

Not Applicable

 

Ultra Commerce does not currently process or manage any cardholder data (CHD) on its customers behalf

 

Clients are responsible for the management of cardholder data

Data retention, access policies


Customers are responsible for maintaining appropriate data retention policies and procedures, encryption technologies and key management processes for maintaining PCI Data Security Standard requirements

4

Protect cardholder data with strong cryptography during transmission

Network infra, TLS support


Delivers secure network infrastructure and supports TLS for data in transit

Enforce TLS, secure APIs


Enforces TLS for all endpoints, secures APIs, and ensures secure transmission of cardholder data

Use secure endpoints


Connects only via secure endpoints and avoids insecure integrations

5

Protect all systems and networks from malicious software

Infra, managed services


Secures managed infrastructure and provides anti-malware capabilities for managed services

Endpoint protection, patching


Deploys endpoint protection, regularly patches systems, and monitors for malware

Secure endpoints


Ensures their own devices and endpoints are protected when accessing the platform

6

Develop and maintain secure systems and software

Managed services infra


Maintains security of managed service infrastructure and underlying software

SDLC, code review, patching


Follows secure software development lifecycle (SDLC), conducts code reviews, and applies timely patches

Secure customizations


Ensures any custom code or plugins maintained by the customer are securely developed and maintained

7

Restrict access by business need-to-know

IAM infra, root controls


Provides foundational IAM infrastructure and root account controls

Role-based access, least privilege


Implements role-based access, enforces least privilege, and manages user roles within the platform

User access management


Manages their own user access and permissions within the platform

8

Identify and authenticate access to system components

IAM infra, MFA support


Offers IAM, supports multi-factor authentication (MFA), and manages authentication for AWS services

User auth, MFA, logging


Enforces user authentication, MFA, and logs all access to sensitive components

User auth, MFA


Uses strong authentication and MFA for their users and administrators

9

Restrict physical access to cardholder data

Data center security


Ensures physical security of data centers and hardware

Not applicable

Not applicable

10

Log and monitor all access to system components and cardholder data

CloudTrail, CloudWatch


Provides logging services (CloudTrail, CloudWatch) and secures log storage

Log app access, SIEM integration


Integrates application logs, monitors access and connects to SIEM solutions for analysis

Review logs


Reviews log relevant to their own users and activities

11

Test security of systems and networks regularly

Infra vulnerability management


Conducts vulnerability management and security testing for managed infrastructure

Pen testing, vulnerability scans


Performs penetration testing, vulnerability scans, and remediates findings

App-level testing


Tests custom applications or integrations for security issues

12

Support information security with policies and programs

Infra policies


Maintains security policies for its infrastructure and service

Security policies, training


Develops, documents, and enforces security policies; provides staff training and compliance documentation

Security policies


Maintains their own security policies for their users and data, and ensures staff awareness

Key Points

  • AWS is responsible for the security of the cloud (physical, infrastructure, managed services).

  • Ultra Commerce (as the platform provider) is responsible for security in the cloud (configuration, application security, platform controls).

  • Customer (merchant) is responsible for their own data, user access, and any customizations or integrations they perform.

Notes

  • Some requirements (e.g., physical security) are almost entirely AWS’s responsibility unless you use on-premises hardware.

  • Most technical controls are managed by Ultra Commerce, but customers must still manage their own users and data.

  • For detailed control wise responsibilities, refer this spreadsheet.


References

  • PCI DSS v4.0.1 full requirements and guidance

  • AWS PCI DSS v4.0 Compliance Guide

  • PCI DSS Service Provider Controls Matrix best practices.

  • PCI DSS v4.0.1 service provider responsibility requirements.