What is the PCI DSS?
The PCI DSS (Payment Card Industry Data Security Standard) is an information security standard designed to reduce payment card fraud by increasing security controls around cardholder data.
The Standard is a result of a collaboration between the major payment brands and is administered by the PCI SSC (Payment Card Industry Security Standards Council).
The latest iteration of the PCI DSS – version 4.0.1 – was released in June 2024.
Read the full text of PCI DSS v4.0.1 on the PCI Security Standards Council website.
IT Governance is a PCI QSA (Qualified Security Assessor) company.
View our full range of PCI DSS consultancy services
Who has to comply with the PCI DSS?
All merchants and service providers that process, transmit or store cardholder data must comply with the PCI DSS.
- Merchants accept debit or credit card payments for goods or services. Note that the PCI DSS applies to merchants even if they have subcontracted their payment card processing to a third party.
- Service providers are directly involved in processing, storing or transmitting cardholder data on behalf of another entity.
Some organisations can be both a merchant and a service provider. For instance, an organisation that provides data processing services for other merchants will also be a merchant if it accepts card payments.
Speak to a PCI DSS expert
We can support you at every stage of your organisation’s PCI DSS compliance project. Request a call using the form below. Our experts are ready and waiting with practical advice.
Contact us
Benefits of PCI DSS compliance
Payment security is essential for every organisation that stores, processes or transmits cardholder data.
The Standard provides specific, actionable guidance on protecting payment card data. It can be applied to organisations of any size or type that use any method of processing or storing data.
Penalties for non-compliance with the PCI DSS
The PCI DSS is a standard not a law, and is enforced through contracts between merchants, acquiring banks that process payment card transactions and the payment brands.
Each payment brand can fine acquiring banks for PCI DSS compliance violations. In turn, acquiring banks can withdraw the ability to accept card payments from non-compliant merchants.
Compliance obligations for merchants also increase significantly in the event of a breach.
Moreover, cardholder data breaches are also a breach of the EU GDPR (General Data Protection Regulation). and risk penalties of up to £17.5 million or 4% of annual global turnover (UK GDPR), or €20 million or 4% of annual global turnover (EU GDPR) – whichever is greatest .
Learn more about GDPR compliance
The 12 PCI DSS requirements
The PCI DSS specifies 12 requirements that are organised into six control objectives.
Control objectives:
Build and maintain a secure network
PCI DSS requirements:
1. Install and maintain network security controls.
Learn more about PCI DSS Requirement 1
Network security controls – such as firewalls, Cloud-based systems and software-defined solutions – enforce traffic policies between network segments to protect sensitive areas like the cardholder data environment.
They determine whether to allow or block incoming and outgoing traffic based on predefined rules and are used to prevent unauthorised access from untrusted sources such as the Internet, wireless networks, third-party systems or internal networks that fall outside the PCI DSS assessment scope.
2. Apply secure configurations to all system components.
Learn more about PCI DSS Requirement 2
Default passwords and vendor settings are widely known and often exploited by attackers – both internal and external – to compromise systems. Applying secure configurations reduces this risk by limiting potential entry points.
This includes changing default credentials, removing unnecessary software and user accounts, and disabling services that are not required. Together, these measures help reduce the system’s attack surface and improve overall security.
Protect cardholder data
3. Protect stored account data.
Learn more about PCI DSS Requirement 3
Encryption, truncation, masking and hashing are effective ways of protecting stored account data, rendering it unreadable by an attacker who bypasses other security controls but doesn’t have the correct cryptographic keys.
Additional risk-mitigation strategies include storing account data only when necessary, truncating cardholder data when the full PAN is not required, and avoiding the transmission of unprotected PANs via user messaging tools such as email or instant messaging.
While encryption is not required for account data held temporarily in non-persistent memory, controls must ensure that the data is cleared once the business process is complete. If data becomes persistent, all relevant PCI DSS Requirements – including encryption – must be applied.
4. Protect cardholder data with strong cryptography during transmission over open, public networks.
Learn more about PCI DSS Requirement 4
Strong cryptography helps ensure the confidentiality, integrity and non-repudiation of data. To prevent compromise, PANs (primary account numbers) must be encrypted when transmitted over networks that may be accessible to malicious individuals – including public and untrusted networks.
Misconfigured wireless setups and outdated encryption protocols are common targets, making secure configuration essential. Any internal network transmitting, storing or processing PANs falls within the PCI DSS’s scope and must meet its requirements. PANs can be protected by encrypting the data itself, the transmission session, or both – and while using both methods is not mandatory, it is strongly recommended.
Maintain a vulnerability management programme
5. Use and regularly update anti-virus software or programs.
Learn more about PCI DSS Requirement 5
Malware is designed to infiltrate or damage a system without the owner's consent, aiming to compromise the confidentiality, integrity or availability of data, applications or operating systems. Common examples include viruses, worms, Trojans, spyware, ransomware, keyloggers, rootkits and other malicious code.
Malware can enter a network through various business-approved activities, such as employee email (phishing), Internet use and mobile devices, and exploits system vulnerabilities. Using comprehensive anti-malware solutions helps protect systems from both current and emerging malware threats.
6. Develop and maintain secure systems and applications.
Learn more about PCI DSS Requirement 6
Bad actors can exploit security vulnerabilities to gain privileged access to systems. Many of these vulnerabilities are addressed by vendor-provided security patches, which must be installed by the organisations managing the systems.
All system components must be kept up to date with the appropriate software patches to prevent the exploitation of account data by malicious individuals or malware. Appropriate patches are those that have been tested to ensure they do not conflict with existing security configurations.
For bespoke or custom software, applying secure coding techniques and following software lifecycle processes can help avoid many vulnerabilities.
Code repositories storing application code, system configurations, or other security-sensitive data must also be assessed under PCI DSS requirements.
Implement strong access control measures
7. Restrict access to cardholder data by business need-to-know.
Learn more about PCI DSS Requirement 7
Unauthorised individuals can access critical data or systems because of weak access control rules. To prevent this, systems and processes must be put in place to limit access based on job roles and a need-to-know basis.
- Access refers to the ability to view systems, applications or data;
- Privileges determine the actions a user can perform on that data, such as reading, changing or deleting it; and
- Need to know ensures users access only the minimum data required for their job.
These requirements apply to employees, contractors, consultants, vendors and third parties, as well as to application and system accounts (service accounts).
8. Assign a unique ID to each person with computer access.
Learn more about PCI DSS Requirement 8
Two fundamental principles of identifying and authenticating users are:
- Establishing the identity of an individual or process on a computer system; and
- Verifying that the user associated with the identity is who they claim to be.
Identification is achieved by associating an identity with a person or process through an identifier, such as a user, system or application ID. These IDs, also referred to as “accounts,” uniquely identify each person or process, ensuring accountability for actions performed. This accountability allows actions to be traced to authorised users or processes.
9. Restrict physical access to cardholder data.
Learn more about PCI DSS Requirement 9
Any physical access to cardholder data or systems that store, process, or transmit cardholder data presents the opportunity for unauthorised individuals to access or remove such data. Therefore, physical access must be properly restricted. Requirement 9 covers three areas:
- Sensitive areas, which require physical controls to limit access, should be identified and protected appropriately.
- The CDE (cardholder data environment) requires broader physical protections across the entire environment, including sensitive areas within it.
- Facility-level controls apply to the overall premises, such as the management of access at building entry points, including guard desks that log visitors or verify identities. These facility controls may exist outside the CDE or sensitive areas, but still provide essential protection.
Regularly monitor and test networks
10. Track and monitor all access to network resources and cardholder data.
Learn more about PCI DSS Requirement 10
Logging mechanisms and the ability to track user activities are essential for preventing, detecting or minimising the impact of a data breach.
Logs across all system components, especially within the CDE (cardholder data environment), enable comprehensive tracking, alerting and analysis if an issue arises. Without system activity logs, determining the cause of a compromise is challenging, if not impossible.
11. Regularly test security systems and processes.
Learn more about PCI DSS Requirement 11
Vulnerabilities are constantly being discovered by both malicious individuals and security researchers, and new software can introduce additional risks.
To ensure ongoing security, system components, processes and bespoke or custom software should be regularly tested to confirm that security controls remain effective in a constantly evolving environment.
Maintain an information security policy
12. Maintain a policy that addresses information security for employees and contractors
Learn more about PCI DSS Requirement 12
The organisation’s overall information security policy sets the tone for the entire entity and outlines the expectations for personnel. All personnel should be aware of the sensitivity of cardholder data and their responsibilities for protecting it.
For the purposes of Requirement 12, “personnel” includes full-time and part-time employees, temporary employees, contractors and consultants who have security responsibilities for protecting account data or whose actions can impact the security of cardholder data or sensitive authentication data.
How to become PCI DSS compliant
Merchants and service providers can show they meet PCI DSS requirements by auditing their CDE (cardholder data environment) against the Standard's applicable requirements.
The types of audit are:
The type of audit you must undergo and your exact PCI compliance requirements will vary depending on your merchant or service provider level. This level is based on the number of card transactions processed per year.
Generally, the criteria applied will be based on those set by Visa and Mastercard, the predominant payment card brands.
Level-1 organisations
Level-1 organisations must have an external audit performed annually by a QSA and submit an RoC to their acquiring banks to prove their compliance.
The QSA will:
- Validate the scope of the assessment;
- Review all documentation and technical information provided;
- Determine whether the Standard has been met;
- Provide support and guidance during the compliance process;
- Be onsite for the duration of the assessment as required;
- Adhere to the PCI DSS assessment procedures;
- Evaluate compensating controls; and
- Produce the final RoC.
Free green paper: PCI DSS Audits – Preparing for success
Download this paper to better understand the PCI DSS audit process and learn about our step-by-step approach to preparing for audit success.
Download now
List of PCI DSS SAQs
Level-2, -3 or -4 organisations can use an SAQ, comprising yes/no questions, to assess their level of cardholder data security. There are ten different questionnaires available.
You can find out more about PCI SAQs in our blog, Choosing the Right PCI DSS SAQ: a practical guide, by Sujith Parambath. Read now >>
SAQ
|
Description
|
|
A
|
Card-not-present merchants, all cardholder data functions fully outsourced.
|
|
A-EP
|
Partially outsourced e-commerce merchants using a third-party website for payment processing.
|
|
B
|
Merchants with only imprint machines or only standalone, dial-out terminals – no electronic cardholder data storage.
|
|
B-IP
|
Merchants with standalone, IP-connected PTS point-of-interaction (POI) terminals – no electronic cardholder data storage.
|
|
C
|
Merchants with payment application systems connected to the Internet – no electronic cardholder data storage.
|
|
C-VT
|
Merchants with web-based virtual payment terminals – no electronic cardholder data storage.
|
|
D Merchant
|
All other SAQ-eligible merchants not included in the descriptions for SAQ types A to C above.
|
|
D Service Providers
|
All service providers defined by a payment brand as eligible to complete an SAQ.
|
|
P2PE
|
Merchants using hardware payment terminals in a PCI SSC-listed P2PE solution only – no electronic cardholder data storage.
|
|
SPoC
|
Merchants that take in-person card-present payments only.
|
Learn more about PCI SAQs in our free paper
This paper provides an overview of the benefits of PCI DSS compliance, how to reduce your compliance scope, and how to choose the right SAQ under PCI DSS v4.0.
Download now
Assessing the security of your cardholder data
Many organisations use a three-step process to achieve PCI DSS compliance:
PCI DSS Gap Analysis – typically the first step for understanding an organisation’s compliance status. It compares the Standard’s requirements with the organisation’s current arrangements, identifies any compliance gaps and produces a prioritised plan to achieve full PCI DSS compliance.
PCI DSS Remediation – actioning the plan based on the gap analysis to reduce the project's scope where possible and close any remaining compliance gaps.
PCI DSS Audit – having finished implementing the action plan, an assessor will review your CDE and controls to ensure and record proof that you are PCI DSS-compliant.
Watch our free introductory webinar to the PCI DSS
For further information and a better understanding of the PCI DSS, why not listen to our free webinar? You will get expert advice from one of our QSAs, who will explain how the PCI DSS applies to your organisation.
The webinar covers:
- What the PCI DSS is;
- An introduction to the 12 requirements;
- How to define your PCI DSS compliance level;
- Your PCI validation requirements;
- Why it is important to comply; and
- The penalties for non-compliance.
Watch now
Frequently asked questions (FAQs)
What is PCI DSS?
PCI DSS (Payment Card Industry Data Security Standard) is a global standard designed to protect cardholder data and reduce the risk of payment fraud. It applies to any organisation that stores, processes or transmits card payments.
What does PCI DSS stand for?
PCI DSS stands for Payment Card Industry Data Security Standard. It was developed by the PCI Security Standards Council, founded by the major card schemes (Visa, Mastercard, American Express, Discover and JCB).
What is the PCI DSS standard?
The PCI DSS standard sets out 12 requirements for securing cardholder data. These include maintaining secure networks, protecting stored data, regularly monitoring systems and having strong access controls.
What is PCI DSS compliance?
PCI DSS compliance means your organisation meets the requirements of the standard. Depending on your transaction volume, this may involve completing a self-assessment questionnaire or undergoing an external audit by a Qualified Security Assessor (QSA).
How many requirements does PCI DSS have?
PCI DSS is built around 12 core requirements, supported by hundreds of detailed testing procedures and controls. Together, these requirements help protect cardholder data across people, processes and technology.
What’s new in PCI DSS 4.0?
PCI DSS version 4.0 introduced updates such as stronger authentication requirements, greater focus on risk-based security and more flexibility in how controls can be met.
How can an organisation become PCI DSS compliant?
To achieve compliance, you must scope your cardholder data environment (CDE), implement the 12 requirements, validate compliance via an SAQ or QSA audit and submit evidence to your acquiring bank or card brand. Expert consultancy and penetration testing often support this process.
What is the primary purpose of PCI DSS?
The main purpose of PCI DSS is to protect payment card data, reduce the risk of breaches and safeguard consumer trust in electronic payments.
Why is PCI DSS important?
Compliance helps prevent costly data breaches, fines and reputational damage. It also ensures that your organisation can continue to process card payments without restrictions from banks or card schemes.
What happens if you are not PCI DSS compliant?
Non-compliance can result in fines from card schemes, higher transaction fees or even losing the ability to process card payments. It can also leave your business exposed to cyber attacks and data breaches.
Is PCI DSS a legal requirement in the UK?
PCI DSS itself is not law, but UK businesses processing card payments are contractually obliged by acquiring banks and card brands to comply. Regulators also view PCI DSS as best practice for protecting cardholder data.
Is PCI DSS a global standard
Yes. PCI DSS applies worldwide to any organisation handling card payments, regardless of location or industry.
Discover our range of bestselling PCI DSS products and services
As a QSA company, IT Governance provides services to support you at each stage of your organisation’s PCI DSS compliance project.
We can help with reducing your CDE scope, conducting a gap analysis or risk assessment, and testing your systems and processes for security vulnerabilities.
View our range of bestselling products and services to find out how we can help you become PCI compliant today.
Speak to an expert
For more information and guidance on penetration testing or packages that IT Governance offers, please contact our experts who will be able to discuss your needs further.