What Every Business Needs to Know About PCI DSS v4.0 and Email Security
PCI DSS v4.0 represents a significant shift in payment card security expectations. It requires robust anti-phishing and email authentication controls for businesses handling card transactions by March 31, 2025. These requirements directly affect an organisation’s ability to continue processing payment card transactions.
For organisations operating in the broader cybersecurity in South Africa environment, PCI DSS v4.0 reinforces a wider regulatory trend: baseline controls are moving from recommended practice to enforceable requirement.
To begin with, let’s explore why email security, particularly against phishing and spoofing, is crucial.
Why Email Security Matters Under PCI DSS v4.0
Email-based attacks remain a primary risk channel for businesses handling payment data, particularly where phishing and impersonation techniques are involved. Here are some key statistics:
- Email as Attack Vector: Verizon’s Data Breach Investigations Report (DBIR) consistently highlights email as a primary channel for malware delivery and phishing attacks.
- Phishing Impact: A report by the Anti-Phishing Working Group (APWG) showed that phishing attacks continue to be a leading threat vector for cybercrime. Notably, SentinelOne reveals that approximately 96% of phishing attacks are launched through email.
- Spoofing Impact: Industry research consistently highlights the scale of domain spoofing activity, underscoring why enforceable domain authentication controls are increasingly prioritised.
- BEC Costs: The FBI’s Internet Crime Complaint Center (IC3) reports that Business Email Compromise (BEC) scams remain one of the most financially damaging online crimes. In 2023, BEC scams cost businesses billions of dollars globally.
PCI DSS v4.0: A Game-Changing Mandate
PCI DSS v4.0 requires organisations to implement anti-phishing and email authentication controls to reduce the risk of payment card compromise. This includes using technologies like DMARC (Domain-based Message Authentication, Reporting, and Conformance) to prevent fraudsters from using your email domain for fake emails.
Consequences of Non-Compliance
- Fines and Penalties: Potential fines from payment card networks.
- Loss of Payment Processing: Inability to process card payments.
Information about PCI DSS compliance requirements can be found on the PCI Security Standards Council website.
How to Strengthen Email Controls Under PCI DSS v4.0
DMARC as a Control Under PCI DSS v4.0
DMARC supports PCI DSS compliance in several practical ways:
- Prevents Email Spoofing: It helps prevent attackers from using your email domain to send fake emails.
- Enables Proactive Protection: Properly enforced DMARC policies prevent unauthenticated emails from reaching your team’s or customers’ inboxes.
- Provides Audit Trail: It provides a clear audit trail of email authentication attempts, helping in compliance and security audits.
- Enhances Visibility and Protection: DMARC provides reporting visibility into authorised and unauthorised sending sources. This enables controlled policy progression toward enforcement and reduces impersonation risk.
The Bottom Line
PCI DSS v4.0 reflects a broader shift from policy documentation toward enforceable controls that materially reduce payment card risk. DMARC represents one of the most practical and measurable email authentication controls available to organisations handling card data.
Organisations handling payment data should confirm their DMARC posture and ensure that enforcement policies are aligned with PCI DSS v4.0 requirements.
ARMD.digital provides structured DMARC implementation and visibility reporting to support PCI DSS v4.0 alignment.



