PCI DSS Compliance: What It Is & Requirements

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

PCI DSS Compliance: What It Is & Requirements

Kevin Henry

Data Protection

March 17, 2022

9 minutes read
Share this article
PCI DSS Compliance: What It Is & Requirements

Protecting payment card data is non-negotiable in today’s digital-first world. Whether you’re a small online store or a global retailer, achieving PCI compliance isn’t just a best practice—it’s a requirement to safeguard sensitive cardholder data and build customer trust. Yet, PCI DSS can feel overwhelming, with complex rules and constant updates that challenge even the most resourceful teams.

This guide unpacks PCI DSS compliance step-by-step, cutting through the jargon so you know exactly what’s expected. We’ll demystify the essentials, from what counts as cardholder data to how merchant levels impact your obligations. You’ll discover practical insights on network segmentation, encryption, tokenization, and how to leverage validation methods like SAQ, ROC, and AOC to show you’re secure and compliant.

We’ll show you what’s new in PCI DSS v4.0, why it matters to your business, and how the 12 core requirements translate into daily operations. Plus, you’ll learn how strategies like vulnerability scanning, penetration testing, and strong authentication can dramatically reduce your risk—and your PCI scope. Let’s get clear on PCI compliance, so you can focus on growing your business with confidence.

PCI DSS definition and scope

PCI DSS (Payment Card Industry Data Security Standard) is a framework of security requirements designed to protect cardholder data wherever it is processed, stored, or transmitted. Developed by the PCI Security Standards Council—which includes major card brands like Visa, Mastercard, and American Express—PCI DSS sets a universal baseline for any organization handling payment cards.

The scope of PCI DSS covers every system, process, and person that touches cardholder data. This means that if your business accepts, transmits, or stores payment card information—from physical retail terminals to cloud-based e-commerce platforms—PCI DSS applies to you. The standard doesn’t just focus on credit cards; it includes debit and prepaid cards as well, ensuring comprehensive coverage across all card-based transactions.

What exactly falls under PCI DSS scope? Here’s what you need to consider:

  • Cardholder Data Environment (CDE): All systems, networks, and applications that store, process, or transmit cardholder data. This includes databases, POS devices, web servers, and even backup storage.
  • Connected Components: Any system that can access or impact the security of the CDE—even if it doesn’t directly handle cardholder data. This could include authentication servers, internal networks, or support workstations.
  • Third-Party Services: Vendors, cloud providers, and payment processors involved in card data handling must also comply with PCI DSS. Your compliance depends on their security controls, too.

Why does scope matter so much? The wider your PCI DSS scope, the more complex and costly compliance becomes. That’s why techniques like network segmentation are so valuable—they wall off the CDE from the rest of your environment, reducing risk and simplifying audits.

PCI DSS requirements apply to all merchant levels, whether you process a handful of transactions or millions each year. The way you prove compliance will depend on your merchant level, which is determined by transaction volume and risk profile. Some organizations must complete a Report on Compliance (ROC) via a Qualified Security Assessor, while others may use a Self-Assessment Questionnaire (SAQ). In both cases, an Attestation of Compliance (AOC) is submitted to validate your status.

To effectively narrow your scope—and keep compliance manageable—implement security controls like encryption, tokenization, regular vulnerability scanning, and penetration testing. These not only protect cardholder data but also demonstrate due diligence during assessments or audits. By clearly defining your PCI DSS scope from the start, we set a solid foundation for achieving—and maintaining—PCI compliance.

Cardholder data elements (PAN & SAD) and tokenization

Cardholder data elements (PAN & SAD) and tokenization

At the heart of PCI DSS lies the protection of cardholder data—the information that, if compromised, could lead to fraud and identity theft. Understanding what qualifies as sensitive data and how to secure it is foundational to PCI compliance, whether you’re completing a SAQ, undergoing a ROC assessment, or just starting to map your data environment.

What are Cardholder Data Elements?

  • PAN (Primary Account Number): This is the long number across the front of a payment card. If attackers get hold of an unprotected PAN, they can use it to make fraudulent transactions.
  • SAD (Sensitive Authentication Data): SAD includes the full magnetic stripe data, card verification codes (like CVV2, CVC2), and PINs or PIN blocks. PCI DSS strictly prohibits the storage of SAD after authorization, even if encrypted.

Storing or transmitting these data elements triggers the full extent of PCI DSS requirements, raising your merchant level and expanding your compliance obligations. This is why it’s crucial to know exactly where cardholder data lives in your environment and ensure strong protections are in place.

How Tokenization Minimizes PCI Compliance Scope

One of the most effective ways to reduce PCI DSS risk is tokenization. Tokenization replaces the PAN with a unique, randomly generated value—a “token”—that has no meaningful value outside your systems. Here’s how tokenization helps:

  • Reduces PCI Scope: Since tokens can’t be used outside your environment, systems that store only tokens (and not actual PANs or SAD) may be excluded from PCI DSS scope. This can transform what would be a complex SAQ into a simpler one, or lighten the load during a ROC assessment.
  • Limits Data Breach Impact: Even if tokens are stolen, they’re useless to attackers unless they also breach your secure tokenization service.
  • Supports Secure Business Growth: Tokenization enables companies to innovate with loyalty programs, recurring billing, and analytics without risking exposure of actual cardholder data.

Best Practices for Cardholder Data Protection

  • Encrypt cardholder data wherever it’s stored or transmitted. Combine encryption with network segmentation to keep sensitive data isolated from the rest of your environment.
  • Avoid storing SAD under all circumstances. If you must store PAN, ensure it’s truncated, masked, or replaced via tokenization.
  • Regularly conduct vulnerability scanning and penetration testing. These practices help you identify weak points in your cardholder data environment before attackers do.

In summary, knowing your PAN from your SAD, and using tokenization wisely, is core to efficient, effective PCI DSS compliance. By minimizing where and how you handle sensitive data, you not only reduce your merchant level obligations and audit complexity (SAQ, ROC, AOC), but also build a payment environment customers can trust.

Merchant and service provider levels and obligations

Understanding your PCI DSS obligations starts with determining your merchant or service provider level. These levels are set by the major card brands and directly impact the scope, validation method, and annual requirements for PCI compliance. Let’s break down what these levels mean and what each organization must do to stay compliant.

Merchant Levels: Know Where You Stand

  • Level 1: Merchants processing over 6 million card transactions per year (across all channels), or those that have suffered a data breach, must meet the highest scrutiny. This includes a formal Report on Compliance (ROC) conducted by a Qualified Security Assessor (QSA) and submission of an Attestation of Compliance (AOC) annually.
  • Level 2: Merchants processing 1 to 6 million transactions annually. Typically required to complete a Self-Assessment Questionnaire (SAQ), but Visa and Mastercard may still require a ROC.
  • Level 3: E-commerce merchants processing 20,000 to 1 million transactions yearly. Annual SAQ and quarterly network vulnerability scans by an Approved Scanning Vendor (ASV) are standard.
  • Level 4: Merchants processing fewer than 20,000 e-commerce or up to 1 million physical transactions per year. Obligations often include an SAQ and quarterly vulnerability scans, but requirements may vary based on your acquiring bank.

Service Provider Levels: Supporting the Ecosystem

  • Level 1: Service providers processing over 300,000 transactions yearly require a full ROC and AOC by a QSA.
  • Level 2: Those processing fewer than 300,000 transactions must complete an annual SAQ and provide an AOC, though some clients may request a third-party ROC for assurance.

Key Obligations for All Levels

  • Accurate Scoping: Identify all systems that process, store, or transmit cardholder data—including those connected to these environments. Network segmentation is recommended to limit PCI scope and reduce compliance burden.
  • Data Protection: Always use encryption when transmitting cardholder data over open networks and consider tokenization to minimize sensitive data exposure.
  • Security Testing: Regularly perform vulnerability scanning (quarterly, at minimum) and annual penetration testing to uncover potential weaknesses.
  • Validation and Documentation: Complete the appropriate SAQ or ROC and submit an AOC to your acquiring bank or clients, as required by your merchant or service provider level.

Practical Advice: Don’t wait until audit time. Integrate PCI DSS controls into daily operations and keep documentation up-to-date. If you’re unsure about your level or requirements, check with your acquirer or consult a QSA. The better you understand your obligations, the easier it is to maintain ongoing PCI compliance and protect both your business and your customers’ cardholder data.

The 12 PCI DSS requirements (practical summary)

The 12 PCI DSS requirements (practical summary)

Understanding the 12 core requirements of the PCI DSS is crucial to achieving and maintaining PCI compliance. These requirements are designed to protect cardholder data at every stage—from initial collection to long-term storage—across all merchant levels. Let’s break down each requirement and what you need to do in practice:

  • 1. Install and maintain a firewall configuration to protect cardholder data.
    Firewalls are your first line of defense against unauthorized access. Set up robust network firewalls and ensure they’re properly configured. Regularly review rules and test firewall effectiveness, especially if you change your network segmentation or add new payment systems.
  • 2. Do not use vendor-supplied defaults for system passwords and other security parameters.
    Change all default passwords and settings immediately—attackers know these defaults. Use strong, unique credentials for every device, application, and point of sale terminal.
  • 3. Protect stored cardholder data.
    Limit storage to what’s absolutely necessary. Use strong encryption and, where possible, tokenization to render card data useless if stolen. Document retention and disposal policies so old data doesn’t linger and increase risk.
  • 4. Encrypt transmission of cardholder data across open, public networks.
    Use strong encryption (such as TLS) whenever card data moves over the internet or other untrusted networks. Make sure all endpoints and integrations, including payment gateways, are securely configured.
  • 5. Protect all systems against malware and regularly update anti-virus software or programs.
    Deploy reputable anti-virus and anti-malware tools. Schedule frequent scans and enable automatic updates to catch new threats. Don’t forget less obvious endpoints, like POS systems, which can be targets for attackers.
  • 6. Develop and maintain secure systems and applications.
    Keep all software, firmware, and operating systems up to date with security patches. Follow secure coding best practices, and regularly test applications for vulnerabilities, leveraging both vulnerability scanning and penetration testing.
  • 7. Restrict access to cardholder data by business need-to-know.
    Only employees who absolutely need access to card data should have it. Define access roles clearly, review permissions regularly, and promptly revoke access when roles change.
  • 8. Identify and authenticate access to system components.
    Each user must have a unique ID, and multi-factor authentication (MFA) should be standard for access to sensitive systems. Regularly review authentication logs for suspicious activity.
  • 9. Restrict physical access to cardholder data.
    Secure server rooms, payment terminals, and any place where cardholder data is stored. Use locks, badge systems, visitor logs, and video monitoring to prevent unauthorized physical access.
  • 10. Track and monitor all access to network resources and cardholder data.
    Use automated logging and monitoring tools to keep detailed records of who accesses or attempts to access cardholder data. Review logs regularly to spot unusual patterns or potential breaches.
  • 11. Regularly test security systems and processes.
    Schedule vulnerability scanning at least quarterly and after any major network changes. Conduct penetration testing annually. These tests help you find gaps before attackers do.
  • 12. Maintain a policy that addresses information security for all personnel.
    Train your team on PCI DSS expectations, safe data handling, and reporting security incidents. Update policies as your environment or the PCI DSS itself evolves, and make sure everyone understands their role in protecting cardholder data.

Meeting these 12 requirements isn’t just about checking boxes—it’s about embedding security into your business culture and processes. Whether you’re completing a Self-Assessment Questionnaire (SAQ), undergoing a Report on Compliance (ROC), or preparing an Attestation of Compliance (AOC), these steps are fundamental. By focusing on encryption, network segmentation, ongoing vulnerability scanning, and robust security policies, we make PCI DSS compliance a practical, achievable goal—one that keeps

What’s new in PCI DSS v4.0 and why it matters

What’s new in PCI DSS v4.0 and why it matters

PCI DSS v4.0 is the most significant update to the Payment Card Industry Data Security Standard in over a decade. With the explosion of digital payments, evolving security threats, and new technologies impacting how we handle cardholder data, the update couldn’t come at a better time. Let’s break down what’s changed—and why these changes matter for PCI compliance.

Key changes introduced in PCI DSS v4.0

  • Increased flexibility in achieving compliance: PCI DSS v4.0 introduces the “Customized Approach,” which allows organizations to use alternative controls if they meet the intent of a requirement. This is a game-changer for unique environments or businesses with advanced security strategies, as it encourages innovation while maintaining rigorous protection of cardholder data.
  • Stronger authentication protocols: Multi-factor authentication (MFA) is now required for all access into the cardholder data environment (CDE), not just for administrators. This reduces the risk of unauthorized access, making it harder for attackers to compromise sensitive data.
  • Enhanced focus on targeted risk analysis: Instead of one-size-fits-all prescriptions, v4.0 asks organizations to perform targeted risk analyses for certain controls. This means you’ll need to actively assess threats and tailor your security measures, rather than simply checking boxes.
  • Updated requirements for encryption and key management: Stronger encryption standards are now expected, reflecting modern cryptographic best practices. Businesses must ensure encryption of cardholder data both in transit and at rest, making legacy methods obsolete.
  • Expanded requirements for vulnerability management: There’s a greater emphasis on frequent vulnerability scanning and penetration testing. You’ll need to demonstrate that you’re regularly identifying and addressing weaknesses—not just during annual reviews, but as an ongoing process.
  • More detailed requirements for network segmentation: If you use network segmentation to limit the scope of PCI DSS, v4.0 expects clearer documentation and stricter controls. This helps ensure your segmentation is effective and reduces the risk of accidental exposure of cardholder data.
  • Clearer guidance on use of emerging technologies: The new standard acknowledges trends like tokenization and cloud computing, providing more concrete expectations for securing cardholder data in these environments.

Why these updates matter for merchants and service providers

  • Stronger security posture: The changes address today’s real-world threats—think phishing, ransomware, and advanced persistent threats—by raising the bar for what’s considered “secure.”
  • Better alignment with business needs: With the ability to use a customized approach and perform targeted risk assessments, organizations of every merchant level can tailor PCI DSS controls to fit their unique operations, all while staying compliant.
  • More accountability and transparency: The updated requirements for reporting and attestation (think SAQ, ROC, and AOC) make it clear what evidence you need to supply, so there are fewer surprises during assessments.
  • Future-proofing your compliance program: With explicit guidance on encryption, tokenization, and network segmentation, you can confidently adopt new technologies without fear of falling out of PCI compliance.

Adopting PCI DSS v4.0 may require investment—updating policies, refreshing encryption, and tightening controls—but it’s all about keeping cardholder data secure in a rapidly changing risk landscape. If you’re already performing regular vulnerability scanning, penetration testing, and using strong authentication, you’re ahead of the curve. The new standard is here to help us build resilient, adaptable security programs that protect both our customers and our businesses.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

SAQ types and when to use each

SAQ types and when to use each

When it comes to PCI compliance, understanding which Self-Assessment Questionnaire (SAQ) applies to your business is essential. The SAQ is a set of forms used by merchants and service providers to assess and report their PCI DSS compliance status without requiring a full-scale on-site assessment. Each SAQ is tailored for different payment environments and merchant levels, ensuring you only address requirements specific to your cardholder data handling processes.

Choosing the right SAQ type depends on how you accept card payments, your technical setup, and your level of interaction with cardholder data. Using the right SAQ not only streamlines your compliance journey but also ensures you meet the expectations of acquiring banks and card brands. Here’s a breakdown of the main SAQ types and when to use each:

  • SAQ A: For merchants who have fully outsourced all cardholder data processing, storage, and transmission to validated third-party service providers.
    • Use this if your business only handles e-commerce or mail/telephone orders, and you never touch cardholder data (even electronically).
    • Example: An online store using a third-party payment gateway redirecting customers off-site for payment.
  • SAQ A-EP: For e-commerce merchants who outsource payment processing but have a website that can impact the security of the payment transaction.
    • Use this if your site loads payment pages or scripts from your own servers, potentially affecting the payment process even if you do not store cardholder data.
    • Example: E-commerce sites that embed payment forms or scripts, rather than a full redirect.
  • SAQ B: For merchants using only standalone, dial-out terminals with no electronic cardholder data storage.
    • Use this if you process card-present transactions through devices without network connectivity (e.g., traditional phone lines).
    • Example: Small retail shops with basic countertop terminals that only connect via modem.
  • SAQ B-IP: For merchants using standalone, IP-connected payment terminals with no electronic cardholder data storage.
    • Use this if your payment terminals connect over a secure IP network and are isolated from other systems (network segmentation is key here).
    • Example: Modern POS terminals connected directly to payment processors via the Internet, but not storing cardholder data.
  • SAQ C-VT: For merchants who process cardholder data manually via a virtual terminal on a single computer.
    • Use this if you type in card data by hand (e.g., over the phone) and the computer is dedicated solely to virtual terminal transactions, not storing cardholder data.
    • Example: Hospitality businesses or call centers using a web-based payment page exclusively on a locked-down machine.
  • SAQ C: For merchants using payment application systems connected to the Internet, with no electronic storage of cardholder data.
    • Use this if your payment application is on a computer or POS system connected to the Internet, but you never store cardholder data electronically.
    • Example: Retailers with Internet-connected POS systems that process but do not store card data.
  • SAQ D for Merchants: For merchants who do not fit into any of the above categories. This is the most comprehensive SAQ.
    • Use this if your systems store, process, or transmit cardholder data in any way not covered by other SAQs, or if you have complex payment environments.
    • Example: Businesses with in-house payment applications, card data storage, or multiple payment channels.
  • SAQ D for Service Providers: For service providers who process or store cardholder data on behalf of others.
    • Use this if you’re a third-party handling cardholder data for clients, such as payment processors or managed hosting providers.

<

Validation and evidence: ASV scans and penetration testing

Validation and evidence: ASV scans and penetration testing are at the heart of proving your PCI compliance. They go beyond internal checklists, offering concrete evidence that your defenses are robust and effective in the real world. Let’s break down what these security assessments involve and why they matter for every merchant level.

Approved Scanning Vendor (ASV) scans are automated external vulnerability scans required by PCI DSS for any environment that stores, processes, or transmits cardholder data. These scans are conducted by PCI SSC-approved third-party vendors, not by your own team. The purpose? To identify weaknesses in your internet-facing systems—like web servers and firewalls—that could be exploited by attackers.

  • Frequency: ASV scans must be performed at least quarterly, and after any significant changes to your network (think system upgrades or new servers).
  • Scope: Any IP address or domain that touches cardholder data, either directly or indirectly, must be scanned.
  • Outcome: You’ll receive a detailed report highlighting vulnerabilities by severity—passing results are required for PCI DSS validation. This applies whether you submit a SAQ, ROC, or need an AOC.

Penetration testing is the next level of assurance. While ASV scans look for known vulnerabilities, penetration tests simulate real-world attacks on your systems—testing whether a determined attacker could bypass your defenses and access cardholder data.

  • Frequency: At minimum, penetration tests should be performed annually and after any significant infrastructure or application changes.
  • Scope: All systems and network segments within your cardholder data environment (CDE) must be tested, especially when you use network segmentation to separate cardholder data from the rest of your environment. This ensures segmentation is effective and attackers can’t “jump” between networks.
  • Methodology: Testing includes both external (internet-facing) and internal (inside your firewall) attacks. It should cover manual techniques, not just automated tools, and verify controls like encryption and tokenization are working as intended.

What’s the bottom line for your PCI compliance? Both ASV scans and penetration testing create an audit trail—objective proof you’re not just checking boxes but actively defending sensitive cardholder data. Your results (pass/fail, remediation steps, retesting) are key evidence for your PCI DSS validation process, whether you’re filing a Self-Assessment Questionnaire (SAQ) or submitting a Report on Compliance (ROC) with an Attestation of Compliance (AOC).

We recommend scheduling scans and tests well before your PCI DSS deadlines to allow time for remediation. Remember: regular vulnerability scanning and thorough penetration testing aren’t just compliance tasks—they’re cornerstones of a proactive security strategy that protects your customers, your brand, and your bottom line.

Reducing scope with network segmentation and P2PE

Reducing the scope of PCI DSS compliance is one of the smartest steps any organization can take to simplify security and limit risk. Two of the most effective tools for this are network segmentation and point-to-point encryption (P2PE). By strategically applying these methods, we can focus our resources on the systems that truly matter—and make PCI compliance not just achievable, but sustainable.

Network segmentation involves separating the parts of your IT environment that handle cardholder data from those that don’t. This means isolating payment systems, databases, and applications that process, store, or transmit sensitive cardholder data, so they’re not accessible from less secure parts of the network. Why does this matter? Because the smaller your cardholder data environment (CDE), the fewer systems you need to secure, monitor, and assess for PCI DSS compliance.

  • Reduces Compliance Burden: By isolating cardholder data, you shrink the number of systems in scope for PCI DSS, which can lower costs and make controls easier to implement.
  • Limits Risk: If a breach occurs outside the segmented environment, cardholder data remains protected.
  • Simplifies Assessments: For many merchant levels, a tightly scoped environment means fewer questions on your Self-Assessment Questionnaire (SAQ) or faster, more focused Report on Compliance (ROC) audits.

It’s important to document and validate your segmentation controls. Regular vulnerability scanning and penetration testing should be performed to confirm that segmentation remains effective and that no accidental connections to the CDE have crept in over time.

P2PE (Point-to-Point Encryption) takes security a step further by encrypting cardholder data from the moment of capture—such as when a customer inserts their card into a payment terminal—until it arrives securely at the payment processor. This means card data is never exposed in clear text on your systems, dramatically reducing scope and risk.

  • Scope Reduction: Properly implemented P2PE solutions can remove certain devices and networks from PCI DSS scope, as encrypted cardholder data is unusable to attackers.
  • Streamlined Compliance: With validated P2PE, many merchants qualify for shorter SAQs and less complex audits, focusing compliance activities only where they’re truly needed.
  • Enhanced Security: Even if attackers compromise your environment, strong encryption and tokenization make stolen data worthless.

To get the most benefit, choose a PCI SSC-listed P2PE solution and maintain strict controls over encryption keys and device management. Combine these practices with tokenization, where possible, to further reduce the exposure of cardholder data in your systems.

When it comes to PCI compliance, every decision you make to minimize scope—through network segmentation, P2PE, encryption, and tokenization—makes your environment safer and your compliance journey more manageable. Stay proactive with ongoing assessments, vulnerability scanning, and penetration testing to ensure these controls are working as intended.

Strong authentication and MFA in PCI environments

Strong authentication and Multi-Factor Authentication (MFA) are cornerstones of PCI DSS compliance, especially when it comes to protecting cardholder data in any environment where payment information is processed or stored. As cyber threats evolve, relying on simple passwords is no longer enough. PCI DSS recognizes this and mandates robust authentication controls to ensure only authorized personnel can access sensitive systems.

Why is strong authentication so critical? Attackers often target login credentials to gain unauthorized access to payment systems. If they succeed, they can compromise cardholder data, putting your customers and business at serious risk. This is why PCI DSS requirements emphasize the use of strong, layered authentication mechanisms—especially for personnel with access to the cardholder data environment (CDE) and administrative functions.

What does 'strong authentication' mean within PCI DSS? At its core, strong authentication means requiring users to prove their identity with more than just a password. PCI DSS specifically calls for two-factor or multi-factor authentication (MFA) for:

  • Remote access to the CDE (such as VPN or remote desktop access).
  • Administrative access to systems handling cardholder data, even within the organization’s local network.

MFA typically includes:

  • Something you know (a password or PIN)
  • Something you have (a smartphone app, hardware token, or smart card)
  • Something you are (biometric data like fingerprints or facial recognition)

How does this fit with PCI compliance requirements? PCI DSS Requirement 8 outlines the technical controls for identifying and authenticating access to system components. At merchant level 1—where a Report on Compliance (ROC) and an Attestation of Compliance (AOC) are required—auditors will closely inspect how authentication is managed. For smaller merchants completing a Self-Assessment Questionnaire (SAQ), you’ll validate your MFA practices through pointed questions about access controls, password policies, and MFA implementation.

Best practices for strong authentication and MFA in PCI environments include:

  • Implement MFA for all remote network access to the CDE, whether by employees or third-party vendors.
  • Apply MFA to all administrative access to cardholder data systems, even when users are on the local network.
  • Use network segmentation to limit access, ensuring only those who need access to the CDE are able to reach it, and only after authenticating with MFA.
  • Regularly review user accounts and promptly revoke access when roles change or staff leave.
  • Combine MFA with encryption and tokenization to further minimize the risk of unauthorized access or data leakage.

Don’t forget to test your controls. As part of your vulnerability scanning and penetration testing regimen, simulate attacks that attempt to bypass authentication. Testing not only validates your protections but also prepares your team for real-world threats.

By prioritizing strong authentication and MFA, we’re not just checking a compliance box—we’re actively reducing risk and reinforcing the trust our customers place in us every time they make a payment. This proactive approach helps us stay a step ahead in the complex world of PCI DSS compliance.

Staying PCI compliant is a journey, not a one-time event. As we’ve explored, protecting cardholder data goes far beyond checking a few boxes—it's about building a security-first culture and consistently applying the right controls for your merchant level and transaction environment. Whether your organization needs to complete a Self-Assessment Questionnaire (SAQ), prepare a Report on Compliance (ROC), or submit an Attestation of Compliance (AOC), understanding your obligations is the first step to lasting success.

Key practices like network segmentation, robust encryption, and tokenization form the backbone of PCI DSS compliance. Coupled with regular vulnerability scanning and penetration testing, these measures help catch gaps before criminals do. By mapping your data flows, tailoring your approach to the risks you face, and treating PCI DSS as an ongoing responsibility, you not only meet regulatory requirements—you earn your customers’ trust every day.

Ultimately, PCI compliance protects more than just data—it safeguards your reputation and business continuity. If you stay proactive, leverage the right tools, and keep security top-of-mind, PCI DSS becomes far less daunting. We’re all in this together, and every step toward better security is a win for your customers, your business, and the entire payments ecosystem.

FAQs

Which SAQ applies to us?

Choosing the right Self-Assessment Questionnaire (SAQ) is a key step toward achieving PCI compliance. The SAQ that applies to your business depends primarily on your merchant level and how you process, store, or transmit cardholder data. PCI DSS categorizes merchants by the ways they handle payments—such as e-commerce, mail/telephone order, or in-person transactions—and the technologies they use (like point-to-point encryption or tokenization).

If your business never stores cardholder data, relies on third-party payment processors, or uses only standalone terminals connected by a phone line, you may qualify for a simpler SAQ (like SAQ A or SAQ B). On the other hand, if you maintain your own payment systems, handle e-commerce, or store cardholder data, a more detailed SAQ (such as SAQ C, C-VT, or D) will likely be required. The SAQ D is the most comprehensive and applies to merchants with the most complex environments, including those performing vulnerability scanning and penetration testing.

To determine which SAQ is right for you, start by mapping your payment data flow and reviewing your network segmentation, encryption, and tokenization practices. Also, check your merchant level—higher transaction volumes or storing sensitive data often require a more detailed assessment or even a Report on Compliance (ROC) and an Attestation of Compliance (AOC).

If you're unsure, consult the official PCI DSS documentation or talk to your acquiring bank. They can help you identify the correct SAQ, so you’re completing the right steps for PCI compliance and safeguarding your customers’ data.

How do we reduce PCI scope?

Reducing PCI scope is one of the most effective ways to simplify your journey toward PCI compliance and lower security risks. Essentially, this means minimizing the systems, processes, and people that come into contact with cardholder data. The less exposure your environment has to sensitive payment data, the easier it is to meet PCI DSS requirements and maintain compliance.

Start by implementing strong network segmentation. By isolating systems that handle cardholder data from the rest of your network, you ensure that only a small, clearly defined area falls under PCI scope. This makes it easier to manage security controls and limits the reach of annual audits, whether you’re completing a Self-Assessment Questionnaire (SAQ), Report on Compliance (ROC), or providing an Attestation of Compliance (AOC).

Next, use encryption and tokenization to protect card data both in transit and at rest. These technologies replace sensitive information with secure tokens or encrypted values, so even if other systems process the data, they never touch the real card details—keeping those systems out of PCI scope. This also makes vulnerability scanning and penetration testing more focused and manageable.

If possible, consider outsourcing payment processing to PCI DSS-validated service providers. By letting experts handle the sensitive parts, you’ll reduce your own PCI responsibilities and only need to focus on the specific merchant level requirements relevant to your business. The goal is always to keep your PCI environment as lean as possible—protecting data, simplifying compliance, and reducing risk for everyone involved.

Is tokenization required?

Tokenization is not explicitly required by PCI DSS, but it is highly recommended as an effective way to reduce the risks associated with storing cardholder data. The PCI DSS standards focus on protecting cardholder data through a variety of security controls, such as encryption, access restrictions, and regular monitoring. However, tokenization is one of the most powerful methods for securing sensitive information, as it replaces cardholder data with a non-sensitive equivalent, or "token," which is useless if stolen.

While encryption is a core PCI DSS requirement, tokenization provides an additional layer of security, especially for merchants seeking to minimize the scope of their PCI compliance. By implementing tokenization, merchants can limit where cardholder data resides in their systems, making compliance easier and reducing the costs and complexity of maintaining PCI DSS standards.

Your merchant level and the type of SAQ or ROC you must complete do not require tokenization specifically, but using it helps streamline compliance efforts and demonstrates a proactive approach to protecting cardholder data. For most organizations, adopting tokenization alongside network segmentation, vulnerability scanning, and penetration testing can significantly enhance their security posture and simplify PCI compliance requirements.

How often are scans and tests needed?

Scans and tests are a critical part of maintaining PCI compliance and protecting cardholder data. For most businesses, vulnerability scanning must be performed at least quarterly. This means every three months, you should run scans on all systems that store, process, or transmit payment card information. Additionally, any significant changes to your network or environment—like new systems, hardware, or software—require you to perform another round of scans.

Penetration testing is required at least once a year, or after any major changes to your network segmentation or payment systems. These tests go deeper than vulnerability scans, simulating real-world attacks to identify weaknesses before criminals do. Both internal and external penetration tests are necessary to meet PCI DSS requirements.

Your merchant level and the specific PCI documentation you complete (such as SAQ, ROC, or AOC) can affect the frequency and type of tests required. However, the quarterly scan and annual penetration test are considered minimum standards for most organizations. Continuous attention to encryption, tokenization, and proactive testing will help keep your compliance on track and your customers’ data safe.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles