PCI DSS Compliance Levels Explained: Requirements, Best Practices, and Compliance Tips
Understanding PCI DSS compliance levels helps you match the right validation approach—whether a Self-Assessment Questionnaire (SAQ) or a full Report on Compliance (ROC)—to your transaction volume and risk. This guide explains the levels, summarizes core PCI DSS requirements, and shares practical tips for network segmentation, vulnerability scanning, penetration testing, and building strong security configuration baselines across your cardholder data environment (CDE).
Overview of PCI DSS Compliance Levels
PCI DSS applies to any entity that stores, processes, or transmits cardholder data. Compliance levels classify merchants and service providers primarily by annual transaction volume and risk exposure. The level determines how you validate compliance, not which security controls you must implement—the controls apply to everyone handling card data.
Typical merchant levels and validation
- Level 1: Highest volume or elevated risk (for example, post-incident). Requires an annual on-site assessment resulting in a ROC by a Qualified Security Assessor (QSA) or eligible Internal Security Assessor (ISA), an Attestation of Compliance (AOC), and ongoing activities such as quarterly external vulnerability scans by an Approved Scanning Vendor (ASV).
- Level 2: Mid-to-high volume. Typically validates via SAQ and AOC; some acquirers may still require a ROC depending on risk.
- Level 3: Moderate volume (often e-commerce focused). Generally validates via SAQ plus quarterly ASV scans.
- Level 4: Lower volume. Validates via the appropriate SAQ as directed by the acquirer, with ASV scans where applicable.
Exact thresholds and evidence requirements can vary by payment brand and acquiring bank. Confirm expectations with your acquirer to avoid surprises.
Merchants vs. service providers
Service providers are assessed against the same standard but may have different reporting obligations because they can affect multiple merchants’ CDEs. Contracts should specify who is responsible for which controls and what evidence (SAQ, ROC, AOC) each party supplies.
Core PCI DSS Requirements
PCI DSS organizes its control objectives into 12 requirements. Use the list below to align your policies, standards, and technical controls:
- Install and maintain network security controls (for example, firewalls) to protect the CDE.
- Apply secure configurations to all system components—documented Security Configuration Baselines you maintain and monitor.
- Protect stored account data with strong cryptography, truncation, or tokenization to minimize retention risk.
- Encrypt cardholder data in transit over open, public networks using strong, up-to-date protocols.
- Protect systems and networks from malware with layered defenses and timely updates.
- Develop and maintain secure systems and software through an SDL that includes code review and change control.
- Restrict access to system components and data in the CDE by business need-to-know and least privilege.
- Identify and authenticate users and services with unique IDs and strong authentication for administrative access.
- Restrict physical access to cardholder data and critical facilities.
- Log and monitor access to systems and the CDE; retain logs to support detection and forensics.
- Test security regularly via Vulnerability Scanning, internal/external Penetration Testing, and segmentation validation.
- Support information security with formal policies, governance, and risk management.
Best Practices for PCI DSS Compliance
Scope the CDE precisely
Map data flows end to end, inventory all in-scope assets, and minimize where card data exists. Reducing scope with tokenization and point-to-point encryption lowers risk and assessment effort.
Use Security Configuration Baselines
Harden every platform with explicit baselines, automated configuration management, and continuous drift detection. Treat exceptions as time-bound risks with compensating controls.
Strengthen identity and access
Enforce least privilege, role-based access, and strong authentication for admins and remote access. Routinely certify access rights and remove dormant accounts quickly.
Engineer securely
Embed security in your SDLC with threat modeling, static/dynamic testing, dependency scanning, and secure code reviews. Track changes through a controlled release process tied to risk.
Manage third parties
Require providers that touch card data to furnish an AOC or ROC and define shared responsibilities clearly. Monitor their controls and performance with periodic reviews.
Prepare evidence early
Organize artifacts—policies, tickets, scans, and test results—so your SAQ or ROC compilation is fast and accurate. Maintain versioned records to prove control effectiveness over time.
Maintaining and Monitoring Compliance
Establish a compliance calendar
Schedule quarterly external ASV scans, internal vulnerability scans, annual assessments, penetration tests, policy reviews, and incident response exercises. Track due dates and owners.
Centralize logging and detection
Aggregate logs, enable file integrity monitoring, and tune alerts for high-value signals in the CDE. Investigate promptly and document outcomes to demonstrate continuous control operation.
Control change and configuration
Evaluate security impact before changes, verify post-change controls, and update baselines. Automated checks help prevent misconfigurations from reaching production.
Test your incident response
Run tabletop and technical drills that include payment systems, processors, and communication plans. Capture lessons learned and update runbooks accordingly.
Measure what matters
Use KPIs such as time-to-patch, scan coverage, failed login trends, and segmentation findings to drive improvements and show sustained compliance between assessments.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Network Security and Segmentation
Design to reduce scope
Place the CDE in dedicated network zones and strictly separate it from corporate and guest networks. Effective Network Segmentation shrinks scope, limits blast radius, and simplifies audits.
Control traffic paths
Enforce default-deny rules on firewalls and security groups, allow only required ports and protocols, and restrict outbound egress from the CDE. Use jump hosts and secure bastions for admin access.
Validate segmentation regularly
Prove isolation with targeted testing: route tracing, access control reviews, and penetration testing focused on crossing boundaries. Document evidence for your SAQ or ROC.
Address cloud realities
Segment with VPCs/VNETs, subnets, security groups, and private endpoints. Isolate management planes, and use service-level controls (e.g., IAM, resource policies) to prevent lateral movement.
Avoid common anti-patterns
Do not mix development/test with production networks, share admin networks with user traffic, or permit broad-any rules. Keep CDE monitoring and backup networks isolated and protected.
Security Awareness and Training
Build a program that sticks
Train everyone annually on card data handling, phishing, and reporting procedures, with early onboarding for new hires. Reinforce key behaviors via short, frequent touchpoints.
Make it role-based
Provide deep, hands-on training for administrators and developers on secure configurations, secrets management, and coding patterns that affect the CDE. Include social engineering simulations for frontline staff.
Measure and improve
Track completion rates, assessment scores, and real-world indicators like phishing report/ click ratios. Use results to refine content and target higher-risk teams.
Risk Assessment and Vulnerability Management
Run a living risk assessment
Identify assets, threats, and business impacts; score risks; and prioritize mitigation for the CDE first. Update the assessment after material changes and at least annually.
Operationalize Vulnerability Scanning
Perform internal scans routinely and external scans quarterly with an ASV, plus after significant changes. Track findings to closure with SLAs based on severity and exploitability.
Plan Penetration Testing with purpose
Conduct annual internal and external tests, validate segmentation, and retest high-risk findings. Combine automated discovery with manual techniques to reflect real attacker behavior.
Patch and configure with discipline
Apply risk-based patching for operating systems, applications, and firmware. Keep Security Configuration Baselines current and verified to prevent regressions.
Handle exceptions safely
Use time-bound exceptions with documented compensating controls and management approval. Reassess frequently until the underlying gap is closed.
Conclusion
By scoping the CDE tightly, enforcing strong segmentation, and sustaining disciplined scanning, testing, and configuration practices, you satisfy PCI DSS requirements and build durable resilience. Treat validation (SAQ or ROC) as the proof of a well-run security program—not the goal.
FAQs
What are the different PCI DSS compliance levels?
Levels classify merchants and service providers by transaction volume and risk. Level 1 is the highest and usually requires an annual on-site assessment and ROC; Levels 2–4 generally validate with the appropriate SAQ and supporting evidence such as ASV scans. The security controls are the same for all levels; only the validation method changes.
What requirements must Level 1 merchants meet?
Level 1 merchants typically complete an annual on-site assessment by a QSA or eligible ISA resulting in a ROC and AOC, perform quarterly external ASV scans, conduct internal scans and annual penetration testing, and maintain continuous logging, monitoring, and governance across the CDE. Acquirers may require additional evidence based on risk.
How can businesses maintain ongoing PCI DSS compliance?
Run a compliance calendar, centralize logging and monitoring, enforce stable Security Configuration Baselines, perform regular Vulnerability Scanning and Penetration Testing, manage changes rigorously, and keep training current. Capture evidence continuously so your SAQ or ROC reflects year-round control operation.
What are best practices for network segmentation in PCI DSS?
Isolate the CDE in dedicated zones, apply default-deny rules, strictly limit allowed services, use jump hosts for administration, and separate production from corporate and guest networks. Validate segmentation regularly with targeted testing and document results for your assessment.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.