PCI DSS 4.0 introduced two requirements that directly affect every e-commerce site running third-party scripts on payment pages. These requirements went into effect on 31 March 2025. If your site processes, stores, or transmits cardholder data, you must comply.
Requirement 6.4.3: All payment page scripts that are loaded and executed in the consumer’s browser are managed as follows:
Requirement 11.6.1: A change- and tamper-detection mechanism is deployed as follows:
If your GTM container loads on your checkout or payment page, every tag within that container is a “script loaded and executed in the consumer’s browser” per 6.4.3. That means:
This is not optional. Your QSA (Qualified Security Assessor) will ask for evidence of compliance during your next assessment. “We use GTM” is not sufficient. You need a documented inventory, justifications, and a working change-detection system.
Step one is identifying every script that runs on your checkout page. This includes:
gtm.js file<script> tags in the page source (payment processor JS, chat widgets, A/B testing tools)connect.facebook.net)For each script, document:
| Field | Example |
|---|---|
| Script name | Google Analytics 4 |
| Source URL | google-analytics.com/g/collect |
| Loaded via | GTM Tag ID: GA4-Config |
| Business justification | Revenue tracking for marketing attribution |
| Data owner | Marketing Analytics Team |
| Last reviewed | 2026-03-15 |
| Integrity check method | Runtime content hash comparison |
The change-detection mechanism must detect four types of modifications:
Script additions: A new tag appears on the payment page that was not in the approved inventory. This could indicate a compromised GTM account (Magecart attack) or an unauthorised GTM publish.
Script modifications: An existing script’s content changes. The tag is still there, but its code or configuration is different. This could indicate a supply chain attack where a third-party vendor’s script was compromised.
Script removals: An approved script disappears from the payment page. This could indicate a site deployment that accidentally removed the GTM container, or a GTM publish that removed a required tag.
HTTP header changes: The Content-Security-Policy, Strict-Transport-Security, or other security-relevant HTTP headers on the payment page change. This could indicate a server compromise or misconfiguration.
The requirement specifies monitoring at least once every seven days. But for a payment page, weekly monitoring is the minimum — not the target. A Magecart skimmer that runs for seven days before detection compromises thousands of cards. Real-time or near-real-time detection (within minutes) is the operational standard for effective protection.
During your PCI DSS assessment, your QSA will request:
Automated tag monitoring produces all five evidence types as a byproduct of normal operation. The script inventory is generated automatically. Changes are detected and logged with timestamps. Alert history provides the detection evidence. The system can be tested by adding a benign test tag and verifying the alert fires.
Across every tag, every page, 24/7. Set it up in 5 minutes. No GTM dependency. No developer required.
Start 14-day free trial →Across every tag, every page, 24/7. Set it up in 5 minutes.
No GTM dependency. No developer required.