PCI DSS Compliance
Before diving into PCI DSS, understand:
- Basic payments infrastructure and data flows
- Processor management relationships
- Your current payment methods and scope
- PCI DSS is the Payment Card Industry Data Security Standard, the baseline security for anyone handling cardholder data
- Four merchant levels based on annual transaction volume (Level 1: >6M, Level 2: 1–6M, Level 3: 20K–1M, Level 4: <20K)
- SAQs range from ~22 controls (SAQ A) to 300+ controls (SAQ D)
- Scope reduction techniques: tokenization, P2PE, network segmentation, outsourcing
- Non-compliance fines: $5,000–$100,000/month
What Is PCI DSS?
The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements designed to ensure that all companies that process, store, or transmit credit card information maintain a secure environment.
PCI DSS was created by the PCI Security Standards Council (PCI SSC), founded by Visa, Mastercard, American Express, Discover, and JCB. The council develops, maintains, and promotes the standard, while the card brands enforce compliance.
PCI DSS 3.2.1 was retired on March 31, 2024. The current standard is PCI DSS 4.0.1. Future-dated requirements in 4.0 become mandatory on March 31, 2025.
Who Must Comply
PCI DSS applies to any entity that stores, processes, or transmits cardholder data (CHD) or sensitive authentication data (SAD):
- Merchants accepting payment cards
- Service providers processing, storing, or transmitting CHD on behalf of merchants
- Issuers and Acquirers
- Any entity that could impact the security of CHD (even if they don't directly handle it)
Even if you outsource all payment processing, some PCI DSS requirements still apply. You must verify your service provider's compliance and manage that relationship appropriately.
The 12 PCI DSS Requirements
PCI DSS is organized under six goals, each containing specific requirements:
Build and Maintain a Secure Network and Systems
Requirement 1: Install and Maintain Network Security Controls
- Implement firewalls and network security controls
- Maintain configuration standards for all system components
- Restrict traffic to and from the cardholder data environment (CDE)
- Review firewall rules at least every six months
Requirement 2: Apply Secure Configurations to All System Components
- Change all vendor-supplied default passwords and settings
- Remove or disable unnecessary accounts and services
- Implement only one primary function per server
- Document security configuration standards
Protect Account Data
Requirement 3: Protect Stored Account Data
- Minimize data storage. Only store what's necessary.
- Never store sensitive authentication data (SAD) after authorization
- Mask PAN when displayed (show first 6 and/or last 4 only)
- Render PAN unreadable wherever stored (encryption, hashing, tokenization, truncation)
Requirement 4: Protect Cardholder Data in Transit
- Use strong cryptography when transmitting CHD over open networks
- TLS 1.2 or higher required
- Never send PAN via email, SMS, or chat
Maintain a Vulnerability Management Program
Requirement 5: Protect All Systems and Networks from Malicious Software
- Deploy anti-malware on all systems commonly affected
- Keep anti-malware mechanisms current
- Ensure anti-malware is actively running and cannot be disabled
Requirement 6: Develop and Maintain Secure Systems and Software
- Identify and address vulnerabilities through a risk-based process
- Apply risk-based patching (e.g., critical patches within one month)
- Follow secure software development lifecycle (SDLC)
- PCI DSS 4.0 adds Req 6.4.3: Manage all payment page scripts (JavaScript, etc.)
Implement Strong Access Control Measures
Requirement 7: Restrict Access to System Components and CHD by Business Need-to-Know
- Implement minimum privileges
- Default deny: access only granted when explicitly needed
- Document access control policies
Requirement 8: Identify Users and Authenticate Access
- Assign unique IDs to all users
- MFA required for all access into the CDE (expanded in 4.0)
- 12-character passwords (or 8 characters if combined with MFA)
- Lock accounts after 10 failed attempts
Requirement 9: Restrict Physical Access to Cardholder Data
- Implement entry controls to sensitive areas
- Protect media containing CHD
- Control physical access to systems in the CDE
Regularly Monitor and Test Networks
Requirement 10: Log and Monitor All Access to System Components and CHD
- Implement audit trails for all access
- Synchronize clocks across systems
- Review logs daily
- Retain audit logs for at least 12 months, with 3 months immediately available
Requirement 11: Test Security of Systems and Networks Regularly
- Conduct quarterly wireless testing
- Perform quarterly vulnerability scans by an Approved Scanning Vendor (ASV)
- Conduct annual penetration testing
- Deploy intrusion detection/prevention systems (IDS/IPS)
- PCI DSS 4.0 adds Req 11.6.1: Detect unauthorized payment page changes
Maintain an Information Security Policy
Requirement 12: Support Information Security with Organizational Policies and Programs
- Conduct annual risk assessments
- Maintain acceptable use policies
- Implement security awareness training
- Screen personnel before hiring
- Maintain an incident response plan
Merchant Compliance Levels
Card networks assign merchants to compliance levels based on annual transaction volume. Each level has different validation requirements.
Level 1
Criteria:
- More than 6 million transactions annually (Visa/Mastercard)
- OR any merchant that has experienced a data breach
- OR designated by a card network
Validation Requirements:
- Annual Report on Compliance (ROC) by a Qualified Security Assessor (QSA) or Internal Security Assessor (ISA)
- Quarterly network scans by an ASV
- Annual penetration test
- Attestation of Compliance (AOC)
Level 2
Criteria:
- 1–6 million transactions annually
Validation Requirements:
- Annual Self-Assessment Questionnaire (SAQ)
- May need QSA assessment for SAQ A, A-EP, or D (Mastercard requirement)
- Quarterly ASV scans
- AOC
Level 3
Criteria:
- 20,000–1 million e-commerce transactions annually
Validation Requirements:
- Annual SAQ
- Quarterly ASV scans (if applicable)
- AOC
Level 4
Criteria:
- Fewer than 20,000 e-commerce transactions annually
- OR up to 1 million total transactions annually
Validation Requirements:
- SAQ recommended (not always enforced)
- Quarterly ASV scans (if applicable)
- Direct Mastercard validation may not be required
Mastercard's Site Data Protection (SDP) program and Visa's Account Information Security (AIS) program have specific requirements. Your acquiring bank may impose additional requirements regardless of your level. Always verify with your acquirer.
Service Provider Compliance Levels
Level 1
Criteria:
- More than 300,000 transactions annually
- OR designated by a card network
Validation Requirements:
- Annual ROC by QSA
- Quarterly ASV scans
- Annual penetration test
- AOC
Level 2
Criteria:
- Fewer than 300,000 transactions annually
Validation Requirements:
- Annual SAQ D (Service Provider version)
- Quarterly ASV scans
- AOC
Designated Entities Supplemental Validation (DESV)
Large or high-risk service providers may be required to complete DESV, additional controls beyond standard PCI DSS requirements. This includes:
- More frequent penetration testing
- Enhanced logging and monitoring
- Additional governance requirements
Self-Assessment Questionnaires (SAQs)
SAQs are validation tools for merchants and service providers to assess their own compliance. The appropriate SAQ depends on how you handle cardholder data.
| SAQ | Description | Approx. Controls | Typical Use Case |
|---|---|---|---|
| A | Card-not-present, all CHD outsourced | ~22 | Hosted payment pages, MOTO outsourced |
| A-EP | E-commerce affecting payment page | ~140 | Iframes, JS affecting checkout |
| B | Imprint-only or dial-out terminals | ~41 | Small retail dial-out |
| B-IP | Standalone IP-connected PTS | ~82 | IP terminals, no CHD storage |
| C-VT | Virtual terminal only | ~79 | Call centers, browser-based |
| C | Payment apps connected to internet | ~160 | Small merchant POS |
| D | All other / complex environments | 300+ | CHD storage, doesn't fit above |
| P2PE | Validated P2PE terminals | ~33 | PCI-validated P2PE solution |
Note: Exact question counts change by version; these are ballpark figures.
Choosing Your SAQ
Use this decision tree:
- Do you store cardholder data? → SAQ D
- Is all processing outsourced? → SAQ A or A-EP
- Do you use validated P2PE? → SAQ P2PE
- Do you have IP-connected terminals? → SAQ B-IP or C
Goal: Use redirect/hosted payment pages + tokenization to qualify for SAQ A instead of SAQ D. This dramatically reduces your compliance burden.
Under PCI DSS 4.0, SAQ A eligibility for iframe integrations requires either:
- Compliance with Req 6.4.3 and 11.6.1 for payment page script management, OR
- Confirmation from your processor that they manage these requirements
Redirect integrations (where the customer leaves your site entirely) provide an easier compliance path.
Scope Reduction Strategies
The most effective approach to PCI DSS compliance is reducing your scope: minimizing the systems and processes subject to requirements.
1. Tokenization
What it does: Replaces cardholder data with a non-sensitive token that has no exploitable value.
Benefits:
- Tokens are not cardholder data (out of scope)
- Removes stored PAN from your environment
- Enables card-on-file without storing actual cards
- Can move from SAQ D to SAQ A
Implementation:
- Use your processor's tokenization service
- Ensure tokens are non-reversible
- The token vault is your provider's responsibility
Deep Dive: How Tokenization Works
Tokenization is your most powerful scope reduction tool. Understanding it helps you implement correctly.
Token Types
| Token Type | Description | Use Case |
|---|---|---|
| Payment token | Replaces PAN for processing | Card-on-file, subscriptions |
| Network token | Issued by card networks | Enhanced auth rates, lifecycle updates |
| Merchant token | Processor-specific | Single processor environments |
| Multi-use token | Same token across transactions | Repeat customers |
| Single-use token | One transaction only | One-time payments, checkout |
Network Tokenization Benefits
Network tokens (Visa Token Service, Mastercard Digital Enablement Service) provide additional benefits beyond PCI scope reduction:
| Benefit | Why It Matters |
|---|---|
| Card lifecycle updates | Automatic reissue when card expires |
| Higher auth rates | Issuers trust tokenized transactions |
| Domain-specific | Token only works for your merchant |
| Reduced false declines | Better fraud signal for issuers |
Tokenization Implementation Checklist
| Step | What to Do |
|---|---|
| 1. Select token provider | Processor's native tokenization or third-party |
| 2. Determine token type | Network tokens preferred if supported |
| 3. Implement token creation | At card capture point (checkout, add card) |
| 4. Store tokens, not PANs | Update database schema |
| 5. Display handling | Show last 4 for customer reference |
| 6. Migration plan | Convert existing stored cards to tokens |
Token Security Considerations
| Do | Don't |
|---|---|
| Store tokens in your database | Store PANs alongside tokens "just in case" |
| Use processor's token vault | Build your own reversible tokenization |
| Implement token rotation for high-value accounts | Use tokens that are mathematically reversible to PANs |
| Log token usage | Log actual card numbers |
Token Format Examples
Original PAN: 4111 1111 1111 1111
Processor token: tok_1234567890abcdef
Network token: 4000 0012 3456 7899 (looks like a card but isn't)
Display format: •••• •••• •••• 1111
Note: Network tokens intentionally look like card numbers to work with existing payment infrastructure. They're domain-restricted and useless outside your integration.
2. Point-to-Point Encryption (P2PE)
What it does: Encrypts cardholder data from the point of interaction (terminal) to the decryption environment.
Benefits:
- Qualifies for SAQ P2PE (~33 controls)
- Encrypted data is out of scope
- Dramatically reduces CDE
P2PE vs E2EE:
- P2PE: PCI SSC-validated solution with immediate scope reduction
- E2EE: Encryption at rest and in transit, but requires acquirer approval for scope reduction
3. Network Segmentation
What it does: Isolates the cardholder data environment from other network segments.
Benefits:
- Fewer in-scope systems
- Limits attack surface
- Faster assessments
- Reduced compliance costs
Implementation:
- Use firewalls, VLANs, or physical separation
- Implement role-based access control
- Conduct segmentation testing (Req 11.4.5)
- Document CDE boundaries clearly
4. Outsourcing Payment Functions
Approaches:
- Hosted payment pages (redirect to processor)
- Secure iframes (processor-controlled)
- Gateway API with tokenization (never touch raw card data)
- Managed payment services
Important: Even when outsourcing:
- Verify provider's AOC
- Include provider in your service provider management program
- Understand your residual responsibilities
Network-Specific Requirements
Visa Requirements
- Account Information Security (AIS): Primary compliance program
- Compromise Investigation: Must engage a PCI Forensic Investigator (PFI) after suspected breach
- Fraud Monitoring: Report fraud through required channels
- Terminated Merchant File (TMF): Also known as MATCH, the list of terminated merchants
Mastercard Requirements
- Site Data Protection (SDP): Primary compliance program
- Level 1/2 service providers may require DESV
- Validation documents submitted to acquiring bank
- Information Security Program: Required under Mastercard Rules Section 2.2.7
- Third Party Processor (TPP) registration requirements
Cardholder Data Defined
Understanding what constitutes cardholder data is essential for scoping.
Cardholder Data (CHD)
| Element | Description | Notes |
|---|---|---|
| PAN | Primary Account Number (15-19 digits) | The defining element: if PAN is present, it's CHD |
| Cardholder Name | Name on card | Only CHD when stored with PAN |
| Expiration Date | Card validity period | Only CHD when stored with PAN |
| Service Code | 3-digit code on magnetic stripe | Only CHD when stored with PAN |
Note on truncation: Truncated PAN (first 6 + last 4 digits) is still considered CHD, but permanently deleting the middle digits means you're not storing the full PAN.
Sensitive Authentication Data (SAD)
NEVER store SAD after authorization, even encrypted:
| Element | Description |
|---|---|
| Full track data | Track 1 and Track 2 from magnetic stripe |
| CVV/CVC/CVV2/CID | Card verification codes |
| PIN/PIN block | Personal identification numbers |
Data Rendering Methods
When you must store PAN, render it unreadable using:
| Method | Description |
|---|---|
| Truncation | Permanently remove middle digits (keep first 6 and/or last 4) |
| Tokenization | Replace with non-reversible token |
| Strong hashing | One-way cryptographic hash with salt |
| Encryption | Strong encryption with proper key management (AES-256) |
Compliance Validation and Assessment
Quarterly ASV Scans
- External vulnerability scans performed by an Approved Scanning Vendor
- Required for any internet-facing systems
- Must pass (no high or critical vulnerabilities)
- Submit passing scan reports with your SAQ or ROC
Annual Penetration Testing
- Required for Level 1 and Level 2 merchants
- Test both internal and external networks
- Validate network segmentation effectiveness
- PCI DSS 4.0 requires a defined methodology
Attestation of Compliance (AOC)
- Formal attestation of PCI DSS compliance status
- Signed by QSA (for ROC) or merchant officer (for SAQ)
- Required to be submitted to acquirer
- Often requested by business partners
Consequences of Non-Compliance
| Consequence | Details |
|---|---|
| Monthly fines | $5,000–$100,000/month depending on severity and duration |
| Increased transaction fees | Higher interchange and assessment fees |
| Liability shift | Merchant bears full liability for breach costs |
| MATCH listing | Added to Mastercard terminated merchant file |
| Loss of card acceptance | Processing privileges revoked |
| Brand damage | Breach notification requirements, reputational harm |
Common Compliance Pitfalls
Underestimating Scope
- Payment applications often store data in unexpected places (logs, temp files, databases)
- Systems connected to the CDE are in scope
- Third-party integrations may pull CHD into scope
- Cloud environments have shared responsibility models
Scope Creep Over Time
- New sales channels added without security review
- New devices connected to payment network
- Test environments using production data
- Acquired companies with different security postures
Documentation Gaps
- Outdated network diagrams
- Missing or incomplete policies
- Incomplete service provider inventory
- No business justification for enabled protocols/ports
Key Management Weaknesses
- Using weak or default encryption keys
- No key rotation schedule
- Storing keys with encrypted data
- No split knowledge or dual control for key operations
Misunderstanding Compensating Controls
- Compensating controls are only used when the original requirement cannot be met
- Insufficient documentation of why original requirement isn't achievable
- Not demonstrating equivalent protection
- Failing to re-evaluate annually
PCI DSS 4.0 Key Changes
Customized Approach
- Design your own controls to meet requirement objectives
- Document and test effectiveness
- Requires QSA validation
- More flexibility but more documentation burden
Targeted Risk Analysis
- For certain requirements, determine frequency via targeted risk analysis (TRA) instead of fixed schedules
- Can apply to some log reviews, vulnerability scanning, and other periodic activities where 4.0 explicitly allows
- Must document methodology and defend conclusions
Enhanced Authentication
- MFA required for all CDE access (not just remote access)
- 12-character passwords (8 characters only if system limitations + MFA)
- Service account password/key protection requirements
Payment Page Security (Future-Dated to March 2025)
Requirement 6.4.3: Authorize, document, and monitor all scripts (JavaScript, etc.) on payment pages
Requirement 11.6.1: Implement mechanisms to detect unauthorized changes to payment page content
These requirements address Magecart-style attacks where attackers inject malicious scripts into payment pages to steal card data.
Getting Started with Compliance
- Understand your data flows – Map where CHD enters, moves through, and exits your environment
- Determine your merchant level – Based on annual transaction volume
- Identify scope reduction opportunities – Tokenization, P2PE, outsourcing
- Select appropriate SAQ – After implementing scope reduction
- Implement required controls – Gap analysis against applicable requirements
- Engage qualified assessors – QSA for Level 1, or self-assessment
- Establish ongoing processes – Quarterly scans, annual assessments, continuous monitoring
Next Steps
Just learning about PCI?
- Map your cardholder data environment → Where does card data flow?
- Determine your merchant level → Based on annual transaction volume
- Identify scope reduction opportunities → Tokenization eliminates most PCI burden
Ready to reduce scope?
- Evaluate tokenization providers → Let them handle card data, not you
- Consider hosted payment pages → Remove your systems from scope entirely
- Ask your processor about P2PE terminals → Reduce in-store PCI requirements
Preparing for assessment?
- Gap analysis against your SAQ type → Know what's required
- Engage a QSA early (Level 1) → Don't wait until assessment time
- Establish quarterly ASV scanning → Required for all merchants
See Also
- Fraud Detection Fundamentals - Detection approaches
- AVS and CVV - Verification signals
- 3D Secure - Authentication for payments
- Chargeback Prevention - Reducing disputes
- Authorization Decisioning - How issuers decide
- Payments Overview - How money moves
- Processor Management - Working with processors
- Network Programs - Compliance thresholds
- AML Basics - Anti-money laundering
- Consumer Protection - Reg E and Reg Z
- Buying Payments - Processor selection
- Device Fingerprinting - Session security