Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
TCarrigan
Employee
Employee

[Early Access] Check Point WAF: Automatic Script & IFrame Discovery Now Supporting PCI DSS 4.0

Modern web apps do not run on your code alone anymore. They run on analytics tags, payment widgets, chat tools, marketing pixels, and a long list of third party JavaScript. That flexibility is powerful, but it also creates a new class of risk. Client side attacks such as Magecart style skimming specifically target these external resources, often without ever touching your servers.

PCI DSS 4.0 recognizes this shift.

One of the newest requirements focuses on visibility and control over scripts and iframes that load in a user’s browser, especially on payment pages. Organizations must now know what external code is executing, verify it is authorized, and detect when something changes.

Our best-in-class Check Point WAF now includes Automatic Script and IFrame Discovery and Authorization to help teams meet these requirements without manual inventory work.

What the feature does

The WAF automatically discovers and inventories every external JavaScript and iframe resource loaded by protected applications. Instead of guessing what your site depends on, you get a real, continuously updated view of what actually executes in the browser.

From there, security teams can:

  • Identify all third party scripts and iframe sources
    • Detect newly introduced or modified external resources
    • Prevent unauthorized scripts from executing
    • Enforce an approved trust list of external domains
    • Maintain ongoing visibility required by PCI DSS 4.0

In simple terms, the WAF moves control to where the risk now lives: the client side.

Why this matters

Historically, WAFs focused on protecting the server from malicious requests. But many modern breaches do not attack the server at all. Attackers inject a small script through a compromised third party provider, a tag manager, or a supply chain dependency. The page loads normally, the checkout works, and sensitive data is silently exfiltrated from the user’s browser.

Without visibility into browser executed resources, these attacks can persist for months.

Automatic Script and IFrame Authorization allows organizations to create a baseline of approved sources and immediately flag or block anything new or unauthorized. This significantly reduces exposure to client side data theft while also simplifying PCI compliance audits.

Compliance without operational overhead

PCI DSS 4.0 requires continuous monitoring and documented authorization of scripts on payment pages. Doing this manually is nearly impossible for modern web applications that change frequently and rely on multiple external services.

Check Point WAF automates the discovery, monitoring, and enforcement process so teams can demonstrate:

  • Visibility into all external browser executed code
    • Control over which sources are allowed
    • Detection of unauthorized changes

Security teams gain protection. Compliance teams gain evidence.

The outcome

With Automatic Script and IFrame Discovery and Authorization, organizations can reduce the risk of client side attacks while meeting PCI DSS 4.0 visibility and control requirements, all within the existing WAF security layer.

The web application threat surface moved to the browser. Now your protection has too.

1 Reply
the_rock
MVP Diamond
MVP Diamond

Great news.

Best,
Andy
"Have a great day and if its not, change it"
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events