Home/Blog/Compliance/PCI DSS Compliance: What It Is, Who Needs It, and How to Get There
ComplianceCybersecurity

PCI DSS Compliance: What It Is, Who Needs It, and How to Get There

A practical guide to PCI DSS compliance for merchants and service providers. Learn the 12 requirements, merchant levels, SAQ types, scope reduction strategies, and how to build a compliance roadmap without overspending.

PCI DSS Compliance: What It Is, Who Needs It, and How to Get There

If your business accepts credit cards, you're required to comply with PCI DSS. There's no opt-out, no minimum size threshold, and no grace period. Every organization that stores, processes, or transmits cardholder data falls under the Payment Card Industry Data Security Standard.

Yet compliance rates remain surprisingly low. According to Verizon's Payment Security Report, fewer than 30% of organizations maintain full PCI DSS compliance between annual assessments. The consequences are real: monthly non-compliance fines ranging from $5,000 to $100,000, liability for fraudulent charges after a breach, and the operational devastation that follows — 60% of small businesses close within six months of a data breach.

This guide covers everything you need to understand PCI DSS compliance: what the standard requires, how to determine your merchant level, which self-assessment questionnaire applies to you, and how to build a realistic compliance roadmap.

What is PCI DSS?

PCI DSS (Payment Card Industry Data Security Standard) is a set of security requirements created by the PCI Security Standards Council, which was founded by Visa, Mastercard, American Express, Discover, and JCB. The standard applies to any entity that stores, processes, or transmits cardholder data — regardless of transaction volume.

The current version is PCI DSS 4.0.1, which became mandatory on March 31, 2025. Organizations that were compliant under v3.2.1 must now meet the updated requirements, which place greater emphasis on continuous security, multi-factor authentication, and customized security approaches.

PCI DSS isn't a law, but it's enforced through contractual obligations with payment brands and acquiring banks. Non-compliance can result in:

  • Fines from payment brands ($5,000–$100,000/month)
  • Increased transaction fees or loss of card processing privileges
  • Liability for fraudulent transactions and breach costs
  • Mandatory forensic investigation at your expense after a breach

The 12 PCI DSS Requirements

PCI DSS is organized into six control objectives, each containing specific requirements:

Build and Maintain a Secure Network and Systems

Requirement 1: Install and maintain network security controls. Deploy firewalls (or equivalent) between cardholder data environments and untrusted networks. Document all connections and review firewall rules every six months.

Requirement 2: Apply secure configurations to all system components. Change all vendor-supplied defaults — passwords, SNMP community strings, unnecessary accounts. Harden system configurations using industry-accepted standards (CIS Benchmarks, DISA STIGs).

Protect Account Data

Requirement 3: Protect stored account data. Minimize data retention. Never store sensitive authentication data (full track data, CVV, PIN) after authorization. Encrypt stored PANs using strong cryptography and manage encryption keys securely.

Requirement 4: Protect cardholder data with strong cryptography during transmission over open, public networks. Use TLS 1.2 or higher. Never send unencrypted PANs via email, instant messaging, SMS, or chat.

Maintain a Vulnerability Management Program

Requirement 5: Protect all systems and networks from malicious software. Deploy anti-malware on all systems commonly affected by malware. Keep signatures current and perform periodic scans.

Requirement 6: Develop and maintain secure systems and software. Apply critical security patches within one month of release. Follow secure development practices and address common coding vulnerabilities (SQL injection, XSS, buffer overflows).

Implement Strong Access Control Measures

Requirement 7: Restrict access to system components and cardholder data by business need to know. Implement role-based access control. Default to deny-all and grant access only as needed.

Requirement 8: Identify users and authenticate access to system components. Assign unique IDs to every user. Implement multi-factor authentication (MFA) for all access to the cardholder data environment — a major expansion in PCI DSS 4.0.

Requirement 9: Restrict physical access to cardholder data. Control facility entry, protect media containing cardholder data, and restrict access to networking/communications hardware.

Regularly Monitor and Test Networks

Requirement 10: Log and monitor all access to system components and cardholder data. Implement audit trails for all system components. Synchronize clocks. Review logs daily — automated log monitoring tools are strongly recommended.

Requirement 11: Test security of systems and networks regularly. Run quarterly internal and external vulnerability scans (external scans must be performed by an Approved Scanning Vendor). Conduct annual penetration testing. Deploy intrusion detection/prevention and file integrity monitoring.

Maintain an Information Security Policy

Requirement 12: Support information security with organizational policies and programs. Maintain a security policy that addresses all PCI DSS requirements. Implement a security awareness program. Screen personnel who have access to cardholder data. Maintain an incident response plan.

Merchant Levels and What They Mean

Payment brands categorize merchants into levels based on annual transaction volume. Your level determines your validation requirements:

LevelAnnual TransactionsValidation Requirements
Level 1Over 6 millionAnnual Report on Compliance (ROC) by a QSA, quarterly ASV network scans
Level 21–6 millionAnnual Self-Assessment Questionnaire (SAQ), quarterly ASV scans
Level 320,000–1 million (e-commerce)Annual SAQ, quarterly ASV scans
Level 4Under 20,000 (e-commerce) or up to 1 million (other)Annual SAQ, quarterly ASV scans (recommended)

A few critical notes:

  • Any merchant that suffers a breach can be escalated to Level 1 regardless of transaction volume
  • Visa and Mastercard have slightly different thresholds — always check with your acquiring bank
  • Service providers have their own classification: Level 1 (over 300,000 transactions) and Level 2 (under 300,000)

Which SAQ Do You Need?

The Self-Assessment Questionnaire (SAQ) you must complete depends on how you handle cardholder data. Choosing the right SAQ determines both your workload and your compliance scope:

SAQ A — For e-commerce or mail/telephone merchants that fully outsource cardholder data processing. No electronic storage, processing, or transmission of cardholder data on your systems. This is the shortest SAQ (22 requirements).

SAQ A-EP — For e-commerce merchants that outsource payment processing but whose website could impact transaction security (e.g., your site hosts the payment page even though processing is handled by a third party).

SAQ B — For merchants using only imprint machines or standalone dial-out terminals. No e-commerce, no electronic cardholder data storage.

SAQ B-IP — For merchants using only standalone, PTS-approved point-of-interaction terminals with an IP connection. No e-commerce.

SAQ C — For merchants with payment application systems connected to the internet. No electronic cardholder data storage.

SAQ C-VT — For merchants who manually enter one transaction at a time via a virtual terminal on an isolated computer. No e-commerce.

SAQ D — The full assessment. For merchants that don't fit any other SAQ type, and for all service providers. Covers all 12 requirements (over 300 controls).

Choosing wrong costs you time and money. If you select SAQ A but your website actually influences transaction security, your assessment is invalid. Work with your acquirer or a QSA to determine the correct SAQ.

Scope Reduction: The Most Important Strategy

The single most impactful thing you can do for PCI DSS compliance is reduce your scope. Every system that touches, processes, stores, or could impact cardholder data is in scope — and every in-scope system must meet all applicable PCI DSS requirements.

How to Reduce Scope

Use a payment processor's hosted payment page. If cardholder data never touches your servers, your scope drops dramatically. Services like Stripe Elements, Braintree Drop-in, or Adyen's hosted fields keep card data off your infrastructure entirely.

Network segmentation. Isolate your cardholder data environment (CDE) from the rest of your network. Proper segmentation means only the CDE and systems connected to it are in scope — not your entire corporate network. But segmentation must be validated: improperly configured segmentation doesn't reduce scope.

Tokenization. Replace cardholder data with tokens that have no exploitable value. If you store tokens instead of PANs, those systems may fall out of scope (depending on the tokenization architecture).

Point-to-Point Encryption (P2PE). Use PCI-validated P2PE solutions at the point of interaction. P2PE-encrypted data in transit through your environment doesn't bring those systems into scope.

Common Scoping Mistakes

  • Assuming cloud hosting means the cloud provider handles PCI compliance (shared responsibility applies)
  • Forgetting that Wi-Fi networks connected to the CDE are in scope
  • Overlooking administrative access — if you can RDP into a CDE server from your workstation, that workstation is in scope
  • Not including third-party service providers who access cardholder data in your scope assessment

The Assessment and Certification Process

For Level 2–4 Merchants (SAQ-Based)

  1. Determine your SAQ type with your acquiring bank
  2. Define your cardholder data environment — document all systems, people, and processes that store, process, or transmit cardholder data
  3. Perform a gap assessment against applicable requirements
  4. Remediate gaps — implement missing controls, fix configurations, update policies
  5. Complete the SAQ — answer each requirement honestly
  6. Submit quarterly ASV scan results from an Approved Scanning Vendor
  7. Submit your Attestation of Compliance (AOC) to your acquirer

For Level 1 Merchants (QSA Assessment)

Level 1 merchants must engage a Qualified Security Assessor (QSA) — a company certified by the PCI SSC to perform on-site assessments. The QSA will:

  • Review documentation and policies
  • Interview personnel
  • Observe processes
  • Test technical controls
  • Produce a Report on Compliance (ROC)

QSA assessments typically take 2–6 months depending on scope and organizational readiness. Costs range from $30,000 to $200,000+ depending on environment complexity.

What PCI DSS Compliance Actually Costs

Costs vary enormously based on merchant level, scope, and current security posture. Here are realistic ranges:

ComponentSmall Merchant (Level 4)Mid-Size (Level 2–3)Enterprise (Level 1)
SAQ / QSA Assessment$500–$2,000$5,000–$15,000$30,000–$200,000+
Quarterly ASV Scans$100–$500/quarter$500–$2,000/quarter$2,000–$10,000/quarter
Penetration Testing$3,000–$10,000$10,000–$50,000$50,000–$150,000+
Security Tools & Infrastructure$1,000–$5,000/year$10,000–$50,000/year$100,000+/year
Remediation (if gaps exist)Varies widelyVaries widelyVaries widely

Compare these to breach costs: IBM's 2024 Cost of a Data Breach Report puts the average breach cost at $4.88 million. For organizations handling payment data, the costs are often higher due to card brand fines, forensic investigations, and card reissuance fees.

Building a PCI DSS Compliance Roadmap

If you're starting from scratch, a phased approach works best:

Phase 1: Assess and Scope (Weeks 1–4)

  • Identify all cardholder data flows — where data enters, where it's processed, where it's stored, how it exits
  • Map your cardholder data environment
  • Evaluate scope reduction opportunities (hosted payment pages, tokenization, P2PE)
  • Determine your merchant level and SAQ type
  • Perform an initial gap assessment

Phase 2: Quick Wins (Weeks 4–8)

  • Implement MFA for CDE access
  • Update and harden system configurations
  • Remove unnecessary stored cardholder data
  • Patch critical vulnerabilities
  • Enable logging on all in-scope systems

Phase 3: Policy and Process (Weeks 8–12)

  • Write or update information security policies
  • Develop incident response procedures
  • Create data retention and disposal policies
  • Establish vendor management processes for third-party service providers
  • Begin security awareness training

Phase 4: Technical Controls (Weeks 12–20)

  • Implement network segmentation
  • Deploy file integrity monitoring
  • Configure intrusion detection/prevention
  • Implement encryption for stored data and data in transit
  • Set up centralized log management

Phase 5: Validate and Maintain (Ongoing)

  • Complete your SAQ or schedule your QSA assessment
  • Run ASV scans and remediate findings
  • Conduct penetration testing
  • Establish quarterly review cadence
  • Document everything — auditors care as much about documentation as implementation

Common Mistakes That Delay Compliance

Treating PCI DSS as a one-time project. Compliance is continuous. Organizations that "pass" an annual assessment and then let controls degrade will fail interim checks and face worse consequences during the next assessment cycle.

Underestimating scope. The most common (and expensive) mistake. Organizations often discover mid-assessment that systems they assumed were out of scope are actually connected to the CDE.

Ignoring the human element. Technical controls matter, but most breaches involve human error — phishing, weak passwords, misconfigured systems. Security awareness training isn't optional.

Not engaging your acquiring bank early. Your acquirer determines your merchant level, validates your SAQ type, and sets compliance deadlines. They should be your first conversation, not an afterthought.

Over-relying on compensating controls. Compensating controls are legitimate when a requirement genuinely can't be met, but using them to avoid implementing proper controls creates fragile compliance positions.

PCI DSS 4.0: What Changed

PCI DSS 4.0 introduced several significant changes that organizations must address:

  • Customized approach — Organizations can now design their own controls to meet requirement objectives, rather than following prescribed methods. This requires more documentation and validation but allows for flexibility.
  • Expanded MFA requirements — MFA is now required for all access into the CDE, not just remote access.
  • Targeted risk analysis — Organizations must perform documented risk analyses to determine frequency of certain activities (like log reviews and vulnerability scans).
  • Enhanced authentication — Minimum password length increased to 12 characters (from 7). Passwords must be changed every 90 days only if MFA is not implemented.
  • Anti-phishing mechanisms — Technical controls to detect and protect against phishing attacks are now required.
  • Automated log review — Manual daily log review can be replaced with automated mechanisms, but those mechanisms must be properly configured and monitored.

Next Steps

PCI DSS compliance doesn't have to be overwhelming if you approach it methodically. Start with scope reduction — the less cardholder data your systems touch, the simpler everything else becomes.

If you're unsure where you stand, a gap assessment against the 12 requirements will give you a clear picture of what needs to be done. Focus on high-impact items first: MFA, patching, network segmentation, and data minimization will address the majority of requirements.

For organizations handling complex payment environments, working with a QSA early in the process pays for itself in avoided rework and accurate scoping.

Frequently Asked Questions

Find answers to common questions

Need PCI if: you store/process/transmit credit card data (cardholder name + number). Can't avoid if: merchant account requires it, process cards directly (not through payment processor). Can reduce scope by: using payment processor that handles cards (Stripe, Square—they're PCI compliant, you're not in scope), using iframe/redirect (customer enters card on processor's page, not yours), never storing card data (process and forget). Compliance levels: Level 1 (>6M transactions/year—formal audit required), Level 2-3 (1M-6M—self-assessment), Level 4 (<1M—self-assessment, most SMBs). Even Level 4 requires: annual self-assessment questionnaire (SAQ), quarterly network scans, compliance attestation. Can't completely avoid if you're merchant—but can minimize scope by using compliant payment processors.

Self-assessment (Level 4, <1M transactions): $5K-$15K annually (quarterly scans $2K-$5K, compliance consultant $3K-$10K to help with SAQ, remediation of findings). Level 1 (>6M transactions): $50K-$150K+ annually (formal audit $30K-$100K, quarterly scans, ongoing compliance). Hidden costs: security improvements to pass compliance (network segmentation, encryption, access controls—$10K-$50K depending on gaps), staff time (filling out SAQ, providing evidence, coordinating scans—20-40 hours annually). Avoid costs by reducing scope: use Stripe/Square (they handle PCI, you attest you don't touch cards—free), use redirect payment page (cards never hit your systems—minimal PCI scope). Most SMBs: use payment processor, minimize scope, spend $2K-$5K annually on quarterly scans + attestation. Direct card handling: $10K-$30K annually for compliance.

SAQ (Self-Assessment Questionnaire): compliance checklist you fill out annually. Type depends on how you handle cards: SAQ A (best—redirect to payment processor, cards never touch your systems, ~15 questions), SAQ A-EP (iframe payment form on your page, ~200 questions), SAQ D (full compliance—process cards directly, store card data, ~300 questions). Most SMBs: qualify for SAQ A (use Stripe/Square redirect, minimal questions, easiest). SAQ A requirements: don't store card data, use PCI-compliant processor, secure website (HTTPS), pass quarterly network scan. SAQ D requirements: network segmentation, encryption, access controls, logging, penetration testing—full PCI DSS compliance (12 requirements, 300+ controls). Migration path: currently SAQ D? Redesign to redirect payment (move to SAQ A, 95% reduction in compliance burden). Choose payment architecture based partly on PCI scope—SAQ A is dramatically easier.

PCI requirement: quarterly vulnerability scans by Approved Scanning Vendor (ASV). Scan checks: internet-facing systems for vulnerabilities (unpatched software, misconfigurations, weak encryption). Cost: $500-$1,500/quarter ($2K-$6K/year) depending on IP count and vendor. Process: ASV scans your public IPs (usually 5-20 IPs for SMBs), generates report of vulnerabilities, you remediate findings, rescan until clean (passing scan), submit to payment brands. Failed scans: get 90 days to remediate and pass (if you don't pass, may lose ability to process cards). Common failures: missing patches (update servers), SSL/TLS issues (old encryption, weak ciphers), open ports (close unnecessary services). Passing scan typically requires: systems patched, HTTPS configured properly, unnecessary services disabled. Budget 4-8 hours per quarter for remediation after initial scan.

Consequences: payment processor may impose: monthly non-compliance fees ($50-$500/month), higher transaction fees (0.5-2% penalty), account termination (can't process cards anymore—business killer). Breach penalties: if you're non-compliant and have breach, liable for: fraud losses (chargebacks, fraudulent transactions), fines from payment brands ($5K-$500K depending on breach size), PCI forensic investigation (forced audit, $20K-$100K). Worst case: lose ability to accept cards (competitors who are compliant get your customers). Timeline: quarterly scan failure → 90 days to remediate, SAQ not submitted → processor notices, may freeze account. Most common: non-compliance fees until you fix issues. Serious breach while non-compliant: existential threat (fines, investigation costs, lost merchant account). Compliance is cheaper than non-compliance—$5K-$15K annually vs potential $50K-$500K breach costs.

Achieve PCI DSS Compliance

Our team guides you through PCI DSS 4.0 requirements, SAQ completion, and network segmentation.