Frequently asked questions
Direct answers to the questions we receive most often from CISOs, IT directors, e-commerce directors, commercial directors and PCI officers in the retail sector.
Main changes: mandatory MFA over all administrative access and any access to the cardholder data environment (CDE), specific management of scripts loaded on the payment page to mitigate Magecart (controls 6.4.3 and 11.6.1), reinforced transit cryptography (TLS), flexible risk-based approach for some requirements, and reinforced traceability. The transition to v4.0 is closed — it is the current framework.
No. The official QSA audit is performed by a QSA entity accredited by the PCI Security Standards Council. Hard2bit accompanies: we implement the controls, maintain the evidence, prepare the documentation and accompany during the audit and remediation phase. The separation between QSA and consultant is the correct one.
The strategy combines three planes: architecture (minimise the code loaded on the payment page, ideally a page hosted by the gateway when possible), script control (inventory and explicit authorisation of every third-party script, Subresource Integrity, strict Content Security Policy) and monitoring (PCI DSS v4.0 control 11.6.1 — detection of unauthorised changes to checkout scripts). The new v4.0 controls are not optional — they're the difference between a clean audit and a major finding.
Large grocery retail typically falls in scope as an important entity by its role in production, processing and distribution of food (Annex II of NIS2). Non-grocery retail typically does not, except at very high scale and with a relevant role. Specific thresholds are set by the national transposition through Spanish Law 11/2022 and Royal Decree 43/2021. We validate it in the initial diagnosis and, when applicable, reuse evidence across NIS2, PCI DSS, ISO 27001 and GDPR to the maximum.
The commercial calendar comes first. Technical changes in low-traffic windows (weekday mornings, avoiding weekends), scheduled change freezes during commercial peaks (Black Friday, Christmas, sales, VAT-free day, Valentine's, Father's/Mother's Day depending on relevance to the business), validation on a mirror environment when possible and prior coordination with the payment gateway, marketplaces and partners.
With preparation, not improvising on the key day. The pattern: incident-response drill in September / October, reinforced SOC monitoring throughout the campaign, change freeze from mid-November to January 7th, graceful-degradation plan for checkout (what to do if the gateway fails, what to do if the catalogue degrades), 24/7 DFIR retainer with on-call staff identified, and pre-agreed communication with the e-commerce and marketing departments.
The Digital Services Act applies to online platforms acting as intermediaries. For marketplaces it requires algorithmic transparency, illegal-content management, verified merchant identification (KYBC — Know Your Business Customer) and, for Very Large Online Platforms, maximum obligations. The part affecting the IT team overlaps with the usual GDPR and ISO 27001 controls — we don't duplicate work.
As a critical marketing and privacy asset. The strategy combines hardening of the customer portal (anti credential stuffing, rate limiting, monitoring of login patterns), data governance (classification, DPIA, retention, data subject rights), security of the APIs that connect physical POS, mobile app and central platform, and SOC monitoring of account-takeover attempts and abuse of accounts holding balance or vouchers.
Retail IT suppliers (e-commerce SaaS, POS managers, loyalty, retail ERP, marketing platforms) handle sensitive customer data and, in many cases, cardholder data. The recommended practice combines security clauses in tenders (referencing PCI DSS, ISO 27001, GDPR), contractual incident-notification obligations from the supplier within deadline, governance of supplier access to the corporate network with a centralised broker and periodic review of the supplier's posture.
Yes. The 24/7 SOC/MDR includes prioritised use cases for retail: ransomware precursors on the corporate and store networks, credential stuffing against the customer portal, checkout anomalies (potential Magecart), API token abuse between marketplace and partners and customer-data exfiltration from the CRM. Reinforced during the commercial peak when the value of every minute rises and the cost of a failure does not allow business hours.
We adapt the service to the parent group's frameworks (global controls, proprietary frameworks, group-strategic suppliers, multi-country policy) maintaining local execution in Spain and coordination with the e-commerce and store-management teams in Spanish or English as appropriate. The applicable Spanish framework (GDPR/LOPDGDD, NIS2 if applicable by scale, retail-trade regulations) is covered from the local operation.
For a mid-sized retail chain without a prior framework, a first PCI DSS v4.0 adequacy cycle with QSA audit preparation typically takes between six and twelve months. With a more mature starting point (ISO 27001 already implemented, reasonable segmentation, broad MFA), between three and six months. The biggest variable is checkout script management when many legacy third parties are loading on the payment page.