PCI DSS Targeted Risk Analysis (TRA): What to Know
Introduction
As of March 31, 2025, Targeted Risk Analysis (TRA) will become a mandatory requirement for several controls in PCI DSS v4.0.1. This requirement affects both merchants and service providers equally, marking a significant change in compliance procedures.
Key Points About TRA Requirements
When is TRA Required?
Organizations must implement TRA if they:
- Use iFrames or URLs for third-party payment processing
- Handle cardholder data directly (processing, transport, or storage)
- Use non-P2PE-validated Point of Sale solutions
- Have systems declared exempt from anti-malware software
- Review access less frequently than every six months
- Use the customized approach
- Have payment channels eligible for SAQ types A, A-EP, C, and D
When is TRA Not Required?
Organizations generally don’t need TRA if they only use:
- Legacy systems (analog phone, fax, imprint machine)
- Stand-alone POI devices
- Network-isolated, Internet-connected POS devices
- Network-isolated virtual terminals
- P2PE solutions
- Qualify for SAQ types B, B-IP, C-VT, and P2PE
Detailed Requirements Breakdown
Anti-Malware (5.2.3.1 & 5.3.2.1)
- Applies to systems declared ‘not at risk for malware’
- Covers all system components, including network devices
- Defines frequency for malware scans and risk assessments
Access Management (7.2.5.1 & 8.6.3)
- Covers application and system account reviews
- Defines password change frequencies
- Applies to most entities using SAQ D
Physical Security (9.5.1.2.1)
- Focuses on POS/POI device inspection frequency
- Particularly relevant for card-present transactions
- Required for SAQ D users
Monitoring & Vulnerability Management (10.4.2.1 & 11.3.1.1)
- Establishes log review frequencies
- Sets remediation timelines for non-critical vulnerabilities
- Applies to SAQ A-EP, C, and D users
Website Security (11.6.1)
- Covers payment page tampering detection
- Required for SAQ A, A-EP, or D users
- Weekly checks can exempt from TRA requirement
Incident Response (12.10.4.1)
- Defines training frequency for IR personnel
- Applies to SAQ D users
- Recommended minimum annual training
Targeted Risk Analysis Implementation Requirements
| Requirement | Purpose | Implementation Guidelines | Key Considerations |
|---|---|---|---|
| 5.2.3.1 | Define frequency for malware risk assessment | Review components marked as low malware risk โข Include network devices โข Monitor threat evolution speed | Faster evolving threats require more frequent assessment โข Document justification for components deemed low risk โข Include new threat intelligence in the assessment |
| 5.3.2.1 | Define malware scan frequency | If using continuous behavioral analysis, mark as N/A โข Otherwise implement both real-time and periodic scans | Higher infection likelihood = more frequent scans โข Higher potential impact = more frequent scans โข Consider system criticality |
| 7.2.5.1 | Define access review frequency | Assess how often access privileges change โข Consider the impact of potential account compromise | More frequent changes = more frequent reviews โข Higher impact = more frequent reviews โข Consider role criticality |
| 8.6.3 | Define password change frequency | Review password complexity โข Assess encryption strength โข Count the number of password holders | Stronger passwords + encryption = less frequent changes โข More password holders = more frequent changes โข Consider access criticality |
| 9.5.1.2.1 | Define POS/POI device inspection frequency | Assess supervision level โข Consider transaction volume โข Review incident history | Unattended devices need more frequent checks โข High volume = more frequent checks โข Prior incidents = more frequent checks |
| 10.4.2.1 | Define log review frequency | If using continuous monitoring, may skip TRA โข Otherwise, assess component risk levels | Higher-risk components need more frequent reviews โข Consider data access levels โข Account for alert criticality |
| 11.3.1.1 | Define vulnerability remediation timelines | Assess exploitation likelihood โข Evaluate potential impact โข Set a priority-based schedule | Higher risk = faster remediation โข Keep timeline under one year โข Document justification for timeline |
| 11.6.1 | Define payment page tampering check frequency | If checking weekly or using continuous monitoring, skip TRA โข Otherwise, assess page risk factors | Higher transaction volume = more frequent checks โข More complex sites need more frequent checks โข Consider impact of compromise |
| 12.3.2 | Manage TRA process | Use the PCI DSS template for customized approaches โข Create separate analysis per control โข Review annually | Document all approvals โข Maintain analysis records โข Update as needed |
| 12.10.4.1 | Define incident response training frequency | Consider incident types โข Assess threat evolution rate โข Account for team changes | Minimum annual training recommended โข New threats = more frequent training โข Document training justification |
Implementation Process
Required TRA Elements (12.3.1)
- Asset identification
- Threat identification
- Risk factor analysis
- Frequency justification
- Annual review of analysis
- Updates as needed
Best Practices
- Document all analyses thoroughly
- Consider unique business threats
- Use industry threat data or historical loss data
- Review analyses annually
- Avoid working backward from desired frequencies
- Implement before assessment time
Documentation Options
- Create new processes based on PCI DSS requirements
- Integrate into existing risk evaluation processes
- Use PCI SSC’s published templates and guidance
SAQ Type Considerations
Scope Reduction
- Merchants can use SAQ eligibility for scope reduction
- Service providers need specific justification for scope reduction
- SAQ type alone doesn’t justify service provider scope reduction
TRA Requirements by SAQ Type
- SAQ A: Requirement 11.6.1
- SAQ A-EP: Requirements 5.2.3.1, 5.3.2.1, 8.6.3, 10.4.2.1, 11.6.1
- SAQ C: Requirements 5.2.3.1, 5.3.2.1, 8.6.3, 10.4.2.1
- SAQ D: All TRA requirements
Timeline and Compliance
- Mandatory implementation by March 31, 2025
- Current version: PCI DSS v4.0.1
- Annual reviews required for all TRAs
