What is PCI DSS Compliance? Complete Guide Every day, billions of payment card transactions move through global networks — and every business touching that data is a potential target. A single breach can expose millions of customer records and cost millions of dollars to resolve. PCI DSS is the security standard that defines exactly what organizations must do to protect that data.

The problem is that many businesses process payments without fully understanding what PCI DSS actually requires. They assume outsourcing payments covers them, or they treat annual compliance as a checkbox exercise. That misunderstanding leaves them exposed to fines, data breaches, and loss of payment processing rights.

This guide covers everything you need to know: what PCI DSS is, who must comply, the 12 requirements, compliance levels, how to achieve and maintain compliance, and what happens if you don't.


TL;DR

  • PCI DSS applies to any organization that stores, processes, or transmits payment card data — merchants, SaaS platforms, and service providers alike
  • 12 requirements span six control objectives — from network firewalls to physical access controls
  • Compliance levels (1–4) are based on annual transaction volume and determine how you validate compliance
  • Only 14.3% of organizations maintain full PCI DSS compliance at interim assessments — annual audits aren't enough
  • Non-compliance can result in fines of $5,000–$100,000/month and loss of card processing privileges

What Is PCI DSS Compliance?

PCI DSS (Payment Card Industry Data Security Standard) is the global security standard for any entity that stores, processes, or transmits cardholder data (CHD) or sensitive authentication data (SAD).

Cardholder data includes:

  • Primary Account Number (PAN)
  • Cardholder name
  • Expiration date
  • Service code

Sensitive authentication data includes:

  • Card verification codes (CVV2, CVC2, CID)
  • Full track data
  • PINs and PIN blocks

SAD must never be stored after authorization — even if encrypted.

Origin and Governance

PCI DSS v1.0 launched in December 2004 when Visa, Mastercard, American Express, Discover, and JCB unified their previously separate card security programs into a single standard.

The PCI Security Standards Council (PCI SSC), headquartered in Wakefield, Massachusetts, was formally established on September 7, 2006 to administer and evolve the standard.

PCI DSS v4.0.1 is the currently active version, published June 2024. Key updates include:

  • Renamed Requirement 1 to "Install and Maintain Network Security Controls" (broader than just firewalls)
  • Expanded MFA requirements under Requirement 8 to cover all access into the CDE, not just remote access
  • Introduced a Customized Approach allowing risk-mature organizations to implement alternative controls
  • Added targeted risk analysis requirements for password/passphrase change frequency

What Compliance Actually Means

Compliance has three practical components:

  1. Collect and transmit card data securely
  2. Store it according to PCI DSS's 12 security requirement domains
  3. Validate annually that required controls are in place — through self-assessment questionnaires, third-party audits, or both

PCI DSS is not a government law — it's contractually enforced by card brands through acquiring banks. Minnesota (2007), Nevada (2009), and Washington (2010) have incorporated it into state law, giving compliant businesses a liability safe harbor if a breach occurs.


Who Needs to Comply with PCI DSS?

The PCI DSS Quick Reference Guide is unambiguous: PCI DSS "globally applies to all entities that store, process or transmit cardholder data and/or sensitive authentication data." There is no minimum size or transaction volume that exempts a business from the standard.

This includes e-commerce companies, brick-and-mortar retailers, SaaS platforms, payment gateways, healthcare organizations, universities, and municipalities.

Merchants vs. Service Providers

Type Definition Examples
Merchant Accepts payment cards directly from customers Retailers, restaurants, online stores
Service Provider Third party involved in processing, storing, or transmitting card data on behalf of others Payment gateways, hosting providers, tokenization vendors

Both categories are subject to PCI DSS, though service providers face additional validation requirements. It's also worth noting that a merchant can qualify as a service provider if it handles card data on behalf of other businesses.

Outsourcing Doesn't Remove Responsibility

PCI DSS v4.0.1 is explicit on this point: "Use of a PCI DSS compliant third-party service provider does not make a customer PCI DSS compliant, nor does it remove the customer's responsibility for its own PCI DSS compliance."

If you use a hosted checkout page or payment iframe, your scope is reduced — but not eliminated. You still need to validate that the integration is correctly configured, that your systems don't inadvertently capture card data, and that your third-party providers maintain their compliance status annually (Requirement 12.8).


The 12 PCI DSS Requirements Explained

The 12 requirements are organized into six control objectives. Here's a concise overview:

Control Objective Requirements
Build and Maintain a Secure Network 1–2
Protect Account Data 3–4
Maintain a Vulnerability Management Program 5–6
Implement Strong Access Control Measures 7–9
Regularly Monitor and Test Networks 10–11
Maintain an Information Security Policy 12

PCI DSS 12 requirements organized into six control objective categories

Build and Maintain a Secure Network (Requirements 1–2)

Requirement 1 covers network security controls — what most organizations know as firewalls. Rules must be documented, regularly reviewed, and actively maintained to restrict unauthorized traffic into and out of the Cardholder Data Environment (CDE).

Requirement 2 prohibits vendor-supplied default passwords and insecure default configurations on any system component. These defaults are publicly known and are among the first things attackers try.

Protect Cardholder Data (Requirements 3–4)

Requirement 3 mandates that stored PANs be rendered unreadable using strong cryptography — AES-128 or higher (AES-256 is a common implementation), truncation, tokenization, or hashing. A common failure point: organizations unknowingly store unencrypted PANs in log files or spreadsheets. Running a card data discovery scan is essential before any assessment.

Requirement 4 requires strong cryptography (TLS — not SSL or early TLS, which are explicitly prohibited) for all cardholder data transmitted over open or public networks.

Maintain a Vulnerability Management Program (Requirements 5–6)

  • Requirement 5: Deploy up-to-date anti-malware protection on all systems
  • Requirement 6: Apply timely patches to operating systems, firewalls, databases, and POS terminals — unpatched systems remain one of the most common attacker entry points

Implement Strong Access Controls (Requirements 7–9)

  • Requirement 7: Restrict access to cardholder data based on business need-to-know, using role-based access control (RBAC)
  • Requirement 8: Assign unique IDs to every user; require MFA for all access into the CDE (expanded in v4.0.1 beyond just remote access)
  • Requirement 9: Restrict physical access to cardholder data — video surveillance, access logs, and secure media handling are all required

Regularly Monitor, Test, and Log (Requirements 10–11)

Requirement 10 mandates logging all access to system components and cardholder data. Key specifics:

  • Logs reviewed at least once daily
  • Retained for at least one year (minimum three months immediately available)
  • Protected from unauthorized modification using file-integrity monitoring

Requirement 11 is where many organizations fall short. The Verizon 2024 Payment Security Report found Requirement 11 had the largest control gap of all requirements — only 47.6% of organizations achieved full compliance at interim assessments, with penetration testing sub-requirements at just 67.7%.

Requirements include:

  • Quarterly external vulnerability scans by an Approved Scanning Vendor (ASV)
  • Annual penetration testing covering both network and application layers
  • Retesting after any significant changes to the environment

Automated scanning alone won't close that gap. The sub-requirements around penetration testing demand manual validation — covering business logic flaws, complex attack chains, and authorization gaps that scanners consistently miss.

Maintain an Information Security Policy (Requirement 12)

Requirement 12 enforces organizational accountability by requiring an organization-wide security policy covering:

  • Annual policy review and employee awareness training
  • Formal risk assessments
  • Background checks for personnel with CDE access
  • A documented incident response plan

Auditors routinely flag organizations that have strong technical controls but no documented policy to prove those controls are governed and enforced.


PCI Compliance Levels: What Level Does Your Business Fall Under?

Your compliance level is determined by annual transaction volume and dictates how you validate compliance.

Merchant Levels

Level Transaction Volume Validation Required
Level 1 6M+ transactions/year (or post-breach) Annual on-site QSA audit (ROC) + quarterly ASV scans
Level 2 1M–6M transactions/year Annual SAQ + quarterly ASV scans
Level 3 20K–1M e-commerce transactions/year Annual SAQ + quarterly ASV scans
Level 4 <20K e-commerce or up to 1M total Annual SAQ + quarterly ASV scans (acquirer-determined)

Card brands can manually reclassify any merchant to a higher level at their discretion — Mastercard, for example, can designate any merchant it considers high-risk as Level 1 regardless of volume.

Service Provider Levels

Level Who Qualifies Validation Required
Level 1 Third-Party Processors, Payment Facilitators with 300K+ annual transactions Annual on-site QSA assessment + quarterly ASV scans
Level 2 Lower-volume data storage entities Annual self-assessment (SAQ) + quarterly ASV scans

Reducing Your Scope

Once you know your level, the next question is how to make compliance less painful. Fewer systems in scope means a smaller audit surface, less remediation work, and lower costs. Three approaches that directly shrink your CDE footprint:

  • Network segmentation: Properly implemented, this keeps non-payment systems entirely out of PCI scope — so a vulnerability in your internal tools doesn't drag your entire infrastructure into an audit
  • Tokenization: Systems that only ever see tokens — not real card numbers — generally fall outside PCI scope entirely, which cuts the number of requirements you need to satisfy
  • Hosted payment fields: An iframe that passes card data directly to a PCI-validated server (SAQ A-eligible) means raw card data never reaches your environment — the simplest way to shrink scope for most e-commerce setups

For example, an e-commerce merchant that switches from a direct API integration (SAQ D — all 12 requirements) to a fully hosted iframe solution (SAQ A — ~22 requirements) can cut its compliance burden significantly — often within a single billing cycle.


Three PCI DSS scope reduction strategies comparing segmentation tokenization and hosted payment fields

How to Achieve PCI DSS Compliance

Step 1 — Assess

  • Document all systems, processes, and data flows involving cardholder data
  • Define your CDE scope — be thorough, including connected systems that could serve as attack vectors
  • Run a card data discovery scan to find unencrypted PANs in unexpected locations (logs, spreadsheets, databases)
  • Determine your merchant or service provider level and the corresponding validation method

Step 2 — Remediate

Fix vulnerabilities identified during assessment, prioritizing by risk level. Common tasks:

  • Patching operating systems, applications, and network devices
  • Updating firewall rules and removing unnecessary services
  • Replacing default credentials across all systems
  • Encrypting stored PANs and implementing MFA

Remediation isn't a one-time event. New vulnerabilities emerge continuously, which is why continuous monitoring matters more than annual reviews.

Step 3 — Test

Conduct required security testing before completing your assessment:

  1. Internal and external vulnerability scans by an ASV (quarterly requirement)
  2. Penetration testing covering both network and application layers
  3. Retesting after any significant infrastructure changes

Penetration testing under Requirement 11 should cover both network and application layers, with findings manually validated to eliminate false positives. Automated scan output alone doesn't meet the intent of the requirement.

Step 4 — Report and Validate

Merchant Level Validation Method
Level 1 Report on Compliance (ROC) by QSA + Attestation of Compliance (AOC)
Levels 2–4 Self-Assessment Questionnaire (SAQ) + AOC

Choose the right SAQ type based on how your organization handles card data:

  • SAQ A: Fully outsourced card processing, with no cardholder data touching your systems
  • SAQ D: Direct handling of card data, covering all PCI DSS requirements

Submit your completed documentation to your acquiring bank or card brand.

Step 5 — Monitor and Maintain

PCI compliance is not a one-time certification. The data makes this clear: only 14.3% of organizations remained fully compliant at interim assessments in 2023, down from 43.4% in 2020.

Ongoing obligations include:

  • Quarterly ASV scans
  • Annual penetration tests
  • Daily log reviews
  • Annual policy reviews and employee training
  • Retesting after system changes

Verizon's research found no confirmed payment card breach at any organization validated as fully PCI DSS compliant at the time of the incident. That's the clearest case for sustained, continuous compliance over point-in-time checkboxes.


Five-step PCI DSS compliance process from initial assessment to ongoing monitoring

What Happens If You're Not PCI Compliant?

Financial Penalties

Acquiring banks can impose fines ranging from $5,000 to $100,000 per month for non-compliance — these are contractual penalties enforced through card brand operating rules, not PCI SSC mandates. Beyond fines:

  • Post-breach forensic investigations (required and expensive — estimated $20,000–$150,000+)
  • Liability for fraudulent charges
  • Termination of payment processing rights
  • Placement on Mastercard's MATCH list, which can prevent you from processing cards for up to five years

Business Impact

According to ISACA, nearly 1 in 3 consumers stopped doing business with a company known to have compromised cybersecurity. The IBM 2024 Cost of a Data Breach report puts the global average breach cost at $4.88 million — a 10% increase from 2023 — with 70% of breached organizations reporting significant operational disruption.

European organizations face an additional layer of exposure: a payment card breach can trigger GDPR liability on top of PCI penalties, with fines reaching €20 million or 4% of global annual turnover, whichever is higher.

Competitive and Reputational Cost

PCI compliance is increasingly a baseline trust signal — not just for regulators, but for enterprise customers, payment processors, and partners. In practice, this means:

  • Enterprise procurement teams now screen for PCI compliance before shortlisting vendors
  • SaaS providers and cloud-native businesses without it get eliminated early in the sales cycle
  • Payment processors may restrict or revoke processing rights independent of any breach

Frequently Asked Questions

Who needs to comply with PCI DSS?

Any business that stores, processes, or transmits payment card data must comply — merchants, service providers, SaaS platforms, payment gateways, and more. There are no exemptions based on company size or transaction volume, though volume determines your validation level.

What is a PCI DSS assessment?

A formal evaluation of whether your security controls meet all 12 PCI DSS requirements. Depending on your merchant level, this is either a self-assessment (SAQ completed internally) or an on-site audit conducted by a Qualified Security Assessor (QSA).

What is the SAQ for PCI DSS?

The Self-Assessment Questionnaire lets merchants and service providers self-report their compliance status. Multiple SAQ types exist based on your integration method — SAQ A covers fully outsourced card processing, while SAQ D applies to organizations that handle card data directly.

Who can perform a PCI DSS assessment?

Level 1 merchants require a QSA (a company certified by the PCI SSC to conduct formal assessments). Lower-level merchants can use an Internal Security Assessor (ISA) or complete an SAQ directly, depending on their level and acquiring bank requirements.

How frequently does PCI DSS require penetration testing?

Requirement 11 mandates at least annually and after any significant changes to the cardholder data environment. Quarterly external vulnerability scans by an Approved Scanning Vendor (ASV) are also required year-round.

How much does a PCI DSS audit cost?

SAQ self-assessments for smaller merchants run $50–$300/year. A QSA-conducted on-site audit for Level 1 merchants typically costs $30,000–$50,000, with total compliance costs (remediation, tools, and testing) often exceeding $70,000.