PCI DSS 4.0 Certificate Audit Prep
Everything your QSA will ask about certificates and encryption. PCI DSS 4.0 has 12 requirements—this checklist focuses on Requirement 4 (protect cardholder data in transit) and related certificate controls.

When to Use
- • Preparing for PCI DSS 4.0 assessments
- • Gathering evidence for QSA interviews
- • Fixing certificate-related findings before the audit
- • Training security teams on PCI crypto requirements
Do NOT Use For
- • SAQ A merchants with no CHD handling (outsourced everything)
- • Systems outside the cardholder data environment (CDE)
Quick Reference (TL;DR)
- TLS 1.2 minimum, TLS 1.3 recommended—no legacy protocols
- Forward secrecy required (ECDHE/DHE ciphers)
- No weak ciphers: NULL, RC4, 3DES, export ciphers
- No self-signed certs on public endpoints; complete chain required
- Document your certificate inventory (Requirement 12.3.3 is new)
- Know your scope before anything else
11. Know Your Scope
Objective: Document what systems are in scope before anything else—this is the QSA's first question
💡 **This is the QSA's first question.** If you can't define scope, everything else is harder.
💡 Internal TLS connections are often forgotten—don't overlook service mesh and database links.
💡 QSAs will ask how you govern third-party TLS termination—have their AOCs and crypto configs ready.
22. Requirement 4.2.1 - Protocol Requirements
Objective: "Strong cryptography is used to safeguard PAN during transmission over open, public networks"
Test protocol support:
# Should succeed
openssl s_client -connect payment.example.com:443 -tls1_2 2>&1 | head -5
# Should fail (TLS 1.0 disabled)
openssl s_client -connect payment.example.com:443 -tls1 2>&1 | head -5💡 **Common finding:** TLS 1.0 or 1.1 still enabled on legacy systems.
💡 Prepare server config exports and SSL Labs reports as evidence.
33. Requirement 4.2.1 - Cipher Suite Requirements
Objective: Verify cipher configuration meets PCI DSS 4.0 standards
Export cipher list from server:
nmap --script ssl-enum-ciphers -p 443 payment.example.com💡 **New in 4.0:** Forward secrecy is now explicitly required, not just recommended. Be prepared to show at least one config/export demonstrating ECDHE in use.
💡 3DES removal is new—many legacy systems still have it enabled.
💡 💡 Document which cipher policy baseline you follow (e.g., NIST SP 800-52r2) and keep that doc handy as evidence.
44. Key Strength Requirements
Objective: Ensure certificate keys meet minimum strength thresholds
Check key size:
openssl x509 -noout -text -in cert.crt | grep "Public-Key"Generate 2048-bit DH parameters:
openssl dhparam -out dhparam.pem 2048💡 DH parameters are the most commonly overlooked—many servers use 1024-bit defaults.
💡 **Retire any 1024-bit keys within scope**, even if not internet-facing. QSAs scrutinize internal services too.
💡 Document certificate details as evidence.
55. Certificate Lifecycle Controls
Objective: Be ready for QSA questions about how you manage certificates
💡 QSAs want to see process, not just technology. Document your runbooks.
💡 **Pro tip:** Have specific people assigned to answer each area. QSAs notice when everyone looks at each other.
66. Evidence Collection Checklist
Objective: Gather these BEFORE the QSA arrives
💡 Organize evidence in a shared folder or binder before the audit.
💡 Some QSAs still want paper copies—be prepared.
77. Common Findings & Fixes
Objective: Fix these before the QSA arrives
💡 **Fix critical findings first**—these will fail the audit.
💡 Medium findings won't fail you but show gaps in security posture.
88. Requirement Mapping Quick Reference
Objective: Understand which PCI requirements map to certificate/crypto controls
💡 **New in 4.0:** Requirement 12.3.3 explicitly requires organizations to maintain a cryptographic inventory. Certificates are a key part of this.
💡 This checklist focuses on Requirement 4, but key management (Req 3) is equally important.
99. 30-Day Audit Prep Timeline
Objective: Systematic preparation beats last-minute scrambling
💡 Start early—30 days is minimum for thorough preparation.
💡 If you find issues, you need time to fix them AND verify the fixes.
Troubleshooting
Problem: QSA asks for cryptographic inventory and we don't have one
Solution: Start with certificate inventory from your CLM tool. Document all TLS endpoints, algorithms in use, and key storage locations. This is now required under Requirement 12.3.3.
Problem: Legacy system requires TLS 1.0 for compatibility
Solution: Document a compensating control: network segmentation, enhanced monitoring, planned upgrade timeline. Use the PCI Council's standard Compensating Control Worksheet—QSAs expect to see it in that format.
Problem: Can't disable 3DES due to legacy integrations
Solution: Similar to TLS 1.0: document the business justification, implement compensating controls, and show a migration plan. 3DES removal is new in 4.0, so QSAs are seeing this frequently.
Problem: Certificate expired during previous assessment period
Solution: Be honest. Show what monitoring you've implemented to prevent recurrence. QSAs respect transparency and demonstrated improvement over cover-ups.
Problem: Private keys stored on application servers without HSM
Solution: This isn't automatically a failure, but document your controls: file permissions, encryption at rest, access logging. HSMs are best practice but not always required.