Call the team
Call the team

Australian hospitality groups — from hotel chains and pub groups to restaurant franchises and resort operators — process thousands of payment card transactions every day. Each transaction represents a responsibility: to protect the cardholder’s data from theft, fraud, and misuse. The Payment Card Industry Data Security Standard (PCI DSS) exists to establish a consistent, global baseline for that protection.
As of 31 March 2025, PCI DSS version 4.0.1 became mandatory. All organisations that store, process, or transmit cardholder data must now comply with the updated requirements. For hospitality groups operating across multiple venues, states, or brands, the compliance challenge is significant — but entirely achievable with the right approach.
PCI DSS is a set of security standards created by the PCI Security Standards Council (PCI SSC), founded by Visa, Mastercard, American Express, Discover, and JCB International. The standard applies to every entity involved in payment card processing, including merchants, processors, acquirers, issuers, and service providers.
Hospitality is one of the most targeted industries for payment card breaches. The combination of high transaction volumes, seasonal or casual staff, diverse point-of-sale (POS) environments, and reliance on third-party booking and payment platforms creates a complex attack surface. Non-compliance can result in significant fines, loss of the ability to process card payments, reputational damage, and mandatory breach notification obligations under the Australian Notifiable Data Breaches (NDB) scheme.
PCI DSS 4.0.1 is a limited revision of PCI DSS 4.0, published by the PCI SSC to clarify requirements and address stakeholder feedback. The changes tighten how controls must be interpreted, documented, and validated. For hospitality groups, the key updates include:
PCI DSS 4.0.1 mandates MFA for all access to the cardholder data environment (CDE), including administrative access, remote access, and access from untrusted networks. Previous versions only required MFA for remote access. This means that every staff member, contractor, or third-party vendor accessing payment systems — whether from head office, a hotel reception desk, or a remote support session — must authenticate with at least two factors.
Passwords must now be at least 12 characters in length (or 8 characters where systems cannot support 12). The forced periodic password rotation requirement has been replaced with a risk-based approach — passwords should be changed when compromise is suspected, not on an arbitrary schedule. This aligns with guidance from the National Institute of Standards and Technology (NIST).
PCI DSS 4.0.1 introduces the concept of targeted risk analysis for certain requirements. Rather than prescribing a single approach, organisations can tailor their implementation based on a documented risk assessment. This is particularly relevant for hospitality groups with varying risk profiles across different venues and brands.
Automated log review mechanisms are now required to detect anomalies and suspicious activity. Hospitality groups must implement centralised log collection and analysis across all venues and systems that interact with cardholder data. Alerts must be generated and reviewed in a timely manner.
Online payment pages must now have documented controls for all scripts running on the page. This is critical for hospitality groups with online booking portals or e-commerce sites. Every JavaScript component on a payment page must be inventoried, justified, authorised, and monitored for integrity — protecting against Magecart-style skimming attacks.
PCI DSS 4.0.1 places greater emphasis on managing the risks introduced by third-party service providers. Hospitality groups must document shared responsibilities, assess provider security controls, and monitor third-party activity with alerts for abuse. Given the industry’s reliance on payment gateways, POS vendors, booking engines, and property management systems, this requirement demands close attention.
PCI DSS compliance obligations vary based on the volume of card transactions your organisation processes annually. The card brands (e.g. Visa) define four merchant levels:
Level 1 — More than 6 million transactions per year. Requires an annual on-site audit by a Qualified Security Assessor (QSA) and quarterly network scans by an Approved Scanning Vendor (ASV).
Level 2 — 1 to 6 million transactions per year. Requires an annual Self-Assessment Questionnaire (SAQ) and quarterly ASV scans.
Level 3 — 20,000 to 1 million e-commerce transactions per year. Requires an annual SAQ and quarterly ASV scans.
Level 4 — Fewer than 20,000 e-commerce or up to 1 million other transactions per year. Requires an annual SAQ (recommended) and quarterly ASV scans (if applicable).
Most individual hospitality venues fall into Level 3 or 4. However, hospitality groups operating multiple venues may aggregate to Level 1 or 2 across the portfolio, triggering more rigorous assessment requirements.
Hospitality groups often operate across dozens or hundreds of venues, each with its own POS terminals, network infrastructure, and staff. Ensuring consistent compliance across all locations requires standardised security policies, centralised monitoring, and regular audits at each site.
POS terminals are a primary target for attackers. Hospitality groups must ensure that POS devices are running current, patched firmware, are physically secured against tampering, and are isolated on a segmented network. End-to-end encryption (E2EE) and point-to-point encryption (P2PE) solutions can significantly reduce PCI scope by ensuring cardholder data is encrypted from the moment of capture.
The hospitality industry has notoriously high staff turnover. PCI DSS requires that all personnel with access to cardholder data receive security awareness training upon hire and at least annually thereafter. For hospitality groups, this means building security training into onboarding processes and maintaining records of completion.
Guest Wi-Fi networks must be completely isolated from payment processing networks. PCI DSS requires network segmentation to ensure that public or guest-accessible networks cannot be used as a pathway to the CDE. Regular wireless scanning is recommended to detect rogue access points.
Hospitality groups rely on a web of third-party systems — property management systems (PMS), online travel agents (OTAs), booking engines, loyalty platforms, and payment gateways. Each integration point is a potential vulnerability. PCI DSS 4.0.1 requires documented responsibility matrices and ongoing monitoring for every third-party service provider that touches cardholder data.
PCI DSS compliance in Australia intersects with several domestic regulatory obligations. The Office of the Australian Information Commissioner (OAIC) administers the Privacy Act 1988, which includes the Notifiable Data Breaches (NDB) scheme. Payment card data breaches frequently meet the threshold for mandatory notification. Additionally, the Australian Prudential Regulation Authority (APRA) standard CPS 234 applies to APRA-regulated entities and their service providers, requiring information security capabilities commensurate with information security threats.
For hospitality groups, ensuring PCI DSS compliance provides a strong foundation for meeting these overlapping obligations and demonstrating a culture of data protection to regulators, insurers, and customers alike.
At All IT Services, we understand the unique compliance challenges facing Australian hospitality groups. Our team provides end-to-end PCI DSS support, including scope assessments, gap analysis, remediation planning, network segmentation design, and ongoing compliance monitoring. With offices in Sydney, Brisbane, Melbourne, and Orange, we support multi-venue operations across Australia.
Contact us to discuss your PCI DSS compliance requirements and book a no-obligation assessment.