PCI-DSS Requirements Guide
Complete guide to PCI-DSS compliance covering all 12 requirements. Understand compliance levels, SAQ types, and protect cardholder data.
12
Core Requirements
6
Security Goals
4
Compliance Levels
v4.0
Current Version
What is PCI-DSS?
Payment Card Industry Data Security Standard (PCI-DSS) is a set of security standards designed to ensure all companies that accept, process, store, or transmit credit card information maintain a secure environment.
Who Must Comply
Any organization that stores, processes, or transmits cardholder data, regardless of size or transaction volume.
Enforced By
Payment card brands (Visa, Mastercard, Amex, Discover, JCB) through acquiring banks and payment processors.
Penalties
$5,000-$100,000/month fines, increased transaction fees, loss of payment processing ability, liability for fraud losses.
Merchant Compliance Levels
Your compliance level determines validation requirements based on annual transaction volume
Level 1
Most StringentOver 6 million transactions/year
Large merchants, payment processors
- Annual Report on Compliance (ROC) by QSA
- Quarterly network scans by ASV
- Attestation of Compliance (AOC)
Level 2
1-6 million transactions/year
Mid-size merchants
- Annual Self-Assessment Questionnaire (SAQ)
- Quarterly network scans by ASV
- Attestation of Compliance (AOC)
Level 3
20,000-1 million e-commerce transactions/year
E-commerce merchants
- Annual Self-Assessment Questionnaire (SAQ)
- Quarterly network scans by ASV
- Attestation of Compliance (AOC)
Level 4
Under 20,000 e-commerce or up to 1 million other transactions/year
Small merchants
- Annual Self-Assessment Questionnaire (SAQ)
- Quarterly network scans (recommended)
- Compliance validation requirements set by acquirer
Self-Assessment Questionnaire Types
Choose the SAQ type based on how you handle cardholder data
| SAQ Type | Description | Applies To | Requirements |
|---|---|---|---|
| SAQ A | Card-not-present merchants using fully outsourced payment processing | E-commerce with redirect to payment processor (Stripe Checkout, PayPal) | 22 requirements |
| SAQ A-EP | E-commerce merchants with website that impacts payment security | E-commerce with embedded payment forms (Stripe Elements) | 191 requirements |
| SAQ B | Merchants using imprint machines or standalone dial-out terminals | Brick-and-mortar with basic terminals | 41 requirements |
| SAQ B-IP | Merchants using standalone, PTS-approved payment terminals with IP connection | Modern POS terminals | 82 requirements |
| SAQ C | Merchants with payment application systems connected to the internet | Payment applications on dedicated systems | 160 requirements |
| SAQ C-VT | Merchants using virtual payment terminals via web browser | Virtual terminals for phone orders | 79 requirements |
| SAQ D | All other merchants and service providers | Merchants storing/processing cardholder data, service providers | 329 requirements (full DSS) |
Reduce Your SAQ Scope
Using payment solutions like Stripe Checkout or PayPal where customers are redirected to the payment provider allows you to qualify for SAQ A, reducing your requirements from 329 to just 22.
The 12 PCI-DSS Requirements
Organized into 6 security goals with specific control objectives
Build and Maintain a Secure Network and Systems
2 requirements
Install and maintain network security controls
Configure firewalls and network controls to protect cardholder data
Apply secure configurations to all system components
Change vendor defaults and remove unnecessary services
Protect Account Data
2 requirements
Protect stored account data
Minimize data storage and protect what must be stored
Protect cardholder data in transit
Encrypt transmission of cardholder data over open networks
Maintain a Vulnerability Management Program
2 requirements
Protect all systems against malware
Deploy and maintain anti-malware solutions
Develop and maintain secure systems and software
Apply security patches and develop software securely
Implement Strong Access Control Measures
3 requirements
Restrict access to cardholder data by business need-to-know
Limit access to only those who require it
Identify users and authenticate access
Assign unique IDs and implement strong authentication
Restrict physical access to cardholder data
Protect physical access to systems storing cardholder data
Regularly Monitor and Test Networks
2 requirements
Log and monitor all access to system components and cardholder data
Implement logging and monitoring for security events
Test security of systems and networks regularly
Conduct regular security testing and scanning
Maintain an Information Security Policy
1 requirement
Support information security with policies and programs
Maintain a comprehensive security policy
Implementation Timeline
Typical phases for achieving PCI-DSS compliance
Phase 1
Scoping & Gap Assessment
- Define cardholder data environment (CDE)
- Document all data flows
- Identify applicable SAQ type
- Conduct gap assessment against requirements
- Prioritize remediation efforts
Phase 2
Remediation
- Implement network segmentation
- Deploy encryption and access controls
- Establish logging and monitoring
- Update policies and procedures
- Train personnel on requirements
Phase 3
Validation
- Conduct internal security testing
- Complete vulnerability scans via ASV
- Perform penetration testing
- Prepare evidence documentation
- Complete SAQ or prepare for QSA audit
Phase 4
Attestation & Maintenance
- Submit AOC to acquirer/payment brands
- Conduct quarterly ASV scans
- Review logs and access controls regularly
- Perform annual penetration testing
- Update policies as environment changes
Common Compliance Pitfalls
Avoid these frequent mistakes that lead to PCI-DSS failures
Underestimating Scope
Including too many systems in scope or failing to properly segment the CDE increases complexity and cost significantly.
Solution: Minimize scope through network segmentation, tokenization, and outsourcing payment processing where possible.
Storing Prohibited Data
Storing full magnetic stripe data, CVV/CVC codes, or PIN blocks after authorization is a direct violation.
Solution: Implement data discovery tools and ensure applications never store sensitive authentication data post-authorization.
Weak Segmentation
Claiming network segmentation without proper implementation and testing means all connected systems are in scope.
Solution: Validate segmentation through penetration testing and ensure controls prevent traffic between CDE and out-of-scope networks.
Inconsistent Logging
Missing logs, insufficient detail, or failure to review logs daily prevents detection of security events.
Solution: Centralize logging with SIEM, automate alerting for suspicious activity, and document daily log review process.
Patch Management Gaps
Missing critical patches within 30 days or failing to patch all in-scope systems creates exploitable vulnerabilities.
Solution: Implement automated patch management, track all in-scope systems, and prioritize critical/high vulnerabilities.
Third-Party Risk
Assuming service providers are compliant without verification can lead to compliance failures.
Solution: Obtain AOCs from all service providers annually, maintain service provider inventory, and include PCI requirements in contracts.
PCI-DSS v4.0 Key Changes
Version 4.0 introduces significant updates effective March 2024 (mandatory March 2025)
Need Help with PCI-DSS Compliance?
Schedule a call to discuss your payment security requirements and get expert guidance on achieving compliance.
30 Minutes
Quick, focused conversation
Video or Phone
Your preferred format
No Sales Pitch
Honest, practical advice