PricingDemo
Log InGet API Key

HATS / PCI DSS 4.0 Crosswalk

Document: H33-XWALK-PCIDSS-001
Version: 1.0
Date: 2026-05-22
Framework: PCI DSS v4.0 (March 2022, mandatory March 2025)
Editor: Eric Beans, H33.ai, Inc.

1. Scope

This crosswalk maps HATS capabilities to PCI DSS 4.0 requirements relevant to the protection of cardholder data. PCI DSS 4.0 organizes requirements into 12 principal requirements across 6 goals. This crosswalk focuses on the requirements where HATS-generated evidence can serve as primary or supporting audit artifacts.

This crosswalk is a technical mapping. It does not constitute a PCI DSS compliance validation or replace the assessment of a Qualified Security Assessor (QSA).

2. Requirement 3 -- Protect Stored Account Data

PCI DSS RequirementHATS CapabilityEvidence TypeVerification Method
3.5 Primary account number (PAN) is secured wherever storedEncrypted ComputationFHE computation attestation receipts demonstrating PAN processed without decryptionVerify computation_type indicates FHE operation; confirm PAN never in plaintext in any receipt
3.5.1 PAN rendered unreadable using cryptographyEncrypted Computation + Continuous AttestationEncryption attestation receipts for stored PAN dataVerify encryption receipts exist for all stored PAN; confirm post-quantum key management
3.6 Cryptographic keys used to protect stored data are securedEvidence ChainsKey lifecycle attestation chain recording generation, distribution, rotation, and destructionTraverse key lifecycle chain; verify all key operations attested with governance binding
3.7 Cryptographic key management processesGovernance Replay + Evidence ChainsKey management decision attestation receipts with policy bindingReplay key management decisions; verify each decision followed documented cryptographic policy

3. Requirement 4 -- Protect Cardholder Data with Cryptography During Transmission

PCI DSS RequirementHATS CapabilityEvidence TypeVerification Method
4.2.1 Strong cryptography for transmission over open networksEncrypted ComputationTransmission encryption attestation receipts with ML-KEM-1024 key establishmentVerify PQ key encapsulation receipts for each open-network transmission
4.2.1.1 Inventory of trusted keys and certificatesEvidence ChainsKey and certificate inventory attestation chainTraverse inventory chain; verify completeness against active key inventory

4. Requirement 7 -- Restrict Access to System Components and Cardholder Data

PCI DSS RequirementHATS CapabilityEvidence TypeVerification Method
7.2 Access to system components and data is appropriately defined and assignedContinuous Attestation + Agent AttestationPer-access attestation receipts binding identity, role, and resource to each access eventVerify each access receipt contains authorized identity and role; confirm no unauthorized access patterns
7.2.5 Access assigned to application and system accounts managed appropriatelyEvidence ChainsSystem account access attestation chainTraverse account access chain; verify system account privileges attested at defined review intervals

5. Requirement 8 -- Identify Users and Authenticate Access

PCI DSS RequirementHATS CapabilityEvidence TypeVerification Method
8.2.1 Unique ID assigned to each userContinuous AttestationPer-access attestation receipts with unique identity bindingVerify every access receipt contains a unique tenant_id; confirm no shared identifiers
8.3 Strong authentication for users and administratorsAgent AttestationAuthentication event attestation receipts recording method, strength, and outcomeVerify authentication receipts demonstrate strong authentication for all CDE access
8.6 Authentication mechanisms not shared among multiple accountsEvidence ChainsAuthentication credential attestation chain with per-account bindingVerify credential attestation chain shows unique credentials per account

6. Requirement 10 -- Log and Monitor All Access

PCI DSS RequirementHATS CapabilityEvidence TypeVerification Method
10.2 Audit logs are implemented to support detection of anomaliesContinuous Attestation + Evidence ChainsTamper-evident attestation receipt chain recording all access to CDE componentsVerify evidence chain completeness; confirm three PQ signatures per receipt; validate chain integrity via predecessor hashes
10.2.1 Audit logs capture all individual user access to cardholder dataContinuous AttestationPer-access attestation receipts for every cardholder data access eventVerify every cardholder data access has a corresponding attestation receipt with identity binding
10.2.2 Audit logs capture all actions taken by any individual with administrative accessAgent AttestationPer-action attestation receipts for all administrative operationsVerify administrative action receipts cover all privileged operations; confirm identity binding
10.3 Audit logs are protected from destruction and unauthorized modificationEvidence ChainsCryptographically linked evidence chain where any modification breaks predecessor hash continuityVerify chain integrity; any deletion, modification, or insertion is detectable through hash chain validation
10.4 Audit logs are reviewed to identify anomalies or suspicious activityGovernance ReplayLog review decision attestation receipts with governance bindingReplay log review decisions; verify reviews occurred at required frequency with documented methodology
10.5 Audit log history is retained and available for analysisEvidence ChainsImmutable attestation receipt archive with cryptographic integrity spanning required retention periodVerify chain spans the required 12-month retention period; confirm oldest receipt accessible and valid
10.7 Failures of critical security control systems are detected, reported, and responded toContinuous Attestation + Governance ReplaySecurity control failure attestation receipts; response decision attestation receiptsVerify failure detection receipts generated within SLA; replay response decisions

7. Requirement 11 -- Test Security of Systems and Networks Regularly

PCI DSS RequirementHATS CapabilityEvidence TypeVerification Method
11.3 External and internal vulnerabilities are regularly identified and addressedEvidence ChainsVulnerability scan and remediation attestation chainTraverse scan-to-remediation chain; verify each finding has a corresponding remediation receipt
11.5 Network intrusions and unexpected file changes are detectedContinuous AttestationFile integrity and network state attestation receipts at configurable intervalsCompare successive attestation receipts to detect unauthorized changes; verify attestation continuity
11.6 Unauthorized changes on payment pages are detectedContinuous AttestationPayment page integrity attestation receiptsVerify page integrity attestation continuity; confirm no unauthorized changes between attestation points

8. Requirement 12 -- Support Information Security with Policies and Programs

PCI DSS RequirementHATS CapabilityEvidence TypeVerification Method
12.4 PCI DSS compliance is managedContinuous Attestation + Governance ReplayCompliance management attestation receipts with governance decision bindingReplay compliance management decisions; verify continuous monitoring coverage
12.10 Suspected and confirmed security incidents are responded to immediatelyEvidence Chains + Governance ReplayIncident response evidence chain with governance decision attestationTraverse response chain; replay decisions; verify response timing against documented procedures

9. Coverage Notes

HATS capabilities provide primary evidence for PCI DSS Requirements 3, 10, and 11 (cryptography, logging/monitoring, and testing). Supporting evidence is provided for Requirements 4, 7, 8, and 12. Requirements 1 (network security), 2 (secure configurations), 5 (malware protection), 6 (secure development), and 9 (physical access) are outside the scope of HATS technical capabilities.

When cardholder data is processed under FHE, the H33 architecture ensures PAN is never in plaintext during computation, directly satisfying Requirement 3.5. The attestation receipt chain provides the tamper-evident audit log required by Requirement 10, with cryptographic integrity guarantees that exceed the protection requirements of Requirement 10.3.