Skip to main content

TL;DR: PCI DSS Compliance

PCI DSS (Payment Card Industry Data Security Standard) is the global security framework that governs how businesses handle credit card data. It is a mandatory requirement for any organization that accepts, stores, processes, or transmits cardholder information, designed to prevent data breaches and financial fraud.

Key Takeaways

  • The Model: Compliance is organized into four levels based on annual transaction volume. It consists of 12 technical and operational requirements ranging from maintaining secure firewalls to encrypting data during transmission.

  • Ideal Context: Essential for any business—from brick-and-mortar retailers to global SaaS companies—that wants to avoid hefty fines, increased processing fees, and reputational damage.

  • Implementation Steps:

    • Determine Your Level: Identify your merchant or service provider level based on your annual transaction count.

    • Identify Your SAQ: Select the correct Self-Assessment Questionnaire (e.g., SAQ A for fully outsourced payments vs. SAQ D for high-touch environments).

    • Remediate Gaps: Fix security vulnerabilities identified during your assessment or mandatory quarterly network scans.

    • Submit Documentation: File your Attestation of Compliance (AOC) with your acquiring bank to prove your status.

  • Billing Tech: Utilizing a PCI-compliant billing platform with tokenization allows you to offload sensitive data handling, significantly reducing your compliance scope and administrative burden.

The Bottom Line

PCI DSS is not just a “check-the-box” activity; it is a contractual obligation and the foundation of payment security. For businesses scaling internationally, maintaining continuous compliance is the key to protecting customer trust and ensuring uninterrupted card processing.

Are you looking to reduce your PCI scope through tokenization, or do you need help determining which SAQ type applies to your current billing architecture?

PCI DSS (Payment Card Industry Data Security Standard) is the global security framework that governs how businesses handle credit card data. Any organization that accepts, stores, processes, or transmits cardholder information—regardless of size or transaction volume—falls under its requirements.

The standard exists because card brands like Visa and Mastercard recognized that fragmented security practices across millions of merchants created systemic risk. Rather than each brand enforcing its own rules, they formed the PCI Security Standards Council to establish a unified set of requirements. This guide covers the 12 PCI DSS requirements, compliance levels, validation methods, and practical steps for achieving and maintaining compliance.

Credit card payments ecosystem unified on the PCI DSS standard

What is PCI DSS Compliance?

What is PCI DSS and why does it apply to businesses that process credit cards?

PCI DSS (Payment Card Industry Data Security Standard) is a set of security requirements mandatory for any business, regardless of size, that accepts, stores, processes, or transmits credit card data. The standard requires maintaining a secure network, protecting cardholder data with encryption, and restricting access to prevent theft. Visa, Mastercard, American Express, Discover, and JCB created the PCI Security Standards Council to develop and enforce these requirements across the global payments ecosystem.

The standard protects what’s called “cardholder data,” which includes specific data elements:

  • Primary Account Number (PAN): The 15- or 16-digit credit card number
  • Cardholder name: The name printed on the card
  • Expiration date: The card’s validity period
  • Service code: A three- or four-digit number encoded on the magnetic stripe

If your business touches any of these data elements—even briefly during a transaction—PCI DSS applies. This includes e-commerce checkouts, point-of-sale terminals, recurring billing systems, and any backend infrastructure that routes or stores payment information.

four data elements on credit card for scope of pci dss

Why PCI Compliance Matters for Credit Card Processing

Why is PCI compliance essential for businesses that accept card payments?

PCI compliance protects both your customers and your business from the consequences of data breaches. When cardholder data is compromised, the fallout extends beyond the immediate incident—customers lose trust, and the business faces financial and operational challenges that can persist for years.

Non-compliance carries several concrete risks:

  • Financial penalties: Card brands can impose fines ranging from $5,000 to $100,000 per month for security violations
  • Increased transaction fees: Acquiring banks often charge higher processing rates to non-compliant merchants
  • Reputational damage: Data breaches erode customer confidence and can drive churn
  • Loss of card acceptance: In severe cases, card brands can revoke your ability to process payments entirely

Your merchant agreement with your acquiring bank almost certainly includes PCI compliance as a contractual requirement. This means violations can trigger penalties even without a security incident.

four consequences of non-compliance with PCI DSS

Who is Required to be PCI Compliant?

Which organizations fall under PCI DSS requirements?

PCI DSS applies to every entity that handles cardholder data, regardless of transaction volume or company size. Your specific obligations, however, depend on your role in the payment ecosystem.

Merchants

Merchants are businesses that accept card payments for goods or services. This category includes brick-and-mortar retailers, e-commerce stores, and subscription businesses that bill customers on a recurring basis.

who has to comply with PCI DSS - merchants, service providers, and third party processors

Service Providers

Service providers are organizations that process, store, or transmit cardholder data on behalf of merchants. Examples include payment gateways, hosting providers that store payment data, and managed security services. Service providers face their own compliance requirements and typically undergo more rigorous validation.

Third-Party Payment Processors

Using a third-party processor like Stripe or Braintree reduces your compliance scope significantly, but it doesn’t eliminate your responsibilities entirely. You still complete the appropriate Self-Assessment Questionnaire and maintain secure practices for any systems that interact with payment data.

PCI DSS Compliance Levels for Merchants and Service Providers

How do compliance levels determine what validation you require?

PCI DSS organizes merchants and service providers into levels based on annual transaction volume. Your level determines how rigorously you validate compliance—higher-volume businesses face more extensive audit requirements.

Merchant Compliance Levels

LevelAnnual TransactionsValidation Requirements
Level 1Over 6 millionOn-site audit by QSA, quarterly network scans
Level 21–6 millionAnnual SAQ, quarterly network scans
Level 320,000–1 million (e-commerce)Annual SAQ, quarterly network scans
Level 4Under 20,000 (e-commerce) or up to 1 million (other)Annual SAQ, quarterly scans recommended

The transaction thresholds vary slightly by card brand, so it’s worth checking with your acquiring bank to confirm your exact level. Any merchant that has experienced a data breach may also be elevated to Level 1 regardless of transaction volume.

Service Provider Compliance Levels

Service providers have two levels. Level 1 applies to providers that store, process, or transmit more than 300,000 transactions annually and requires an on-site assessment by a Qualified Security Assessor. Level 2 providers complete an annual Self-Assessment Questionnaire.

four merchant compliance tiers for pci dss

The 12 PCI DSS Requirements

What are the 12 requirements that organizations meet for compliance?

PCI DSS organizes its requirements into six control objectives covering network security, data protection, vulnerability management, access control, monitoring, and security policies.

1) Install and maintain network security controls

Deploy firewalls and network segmentation to isolate systems that handle cardholder data from the rest of your infrastructure.

2) Apply Secure Configurations to all System Components

Change default passwords, remove unnecessary services, and harden systems before deploying them into production environments.

3) Protect Stored Cardholder Data

Minimize data retention—don’t store what you don’t require. When storage is necessary, mask PANs when displayed and encrypt stored data using strong cryptography.

4) Encrypt Cardholder Data During Transmission

Use TLS 1.2 or higher when transmitting cardholder data over open or public networks.

5) Protect Systems from Malware

Deploy and maintain anti-malware software on all systems commonly affected by malicious software.

6) Develop and Maintain Secure Systems and Software

Apply security patches promptly and follow secure coding practices for any custom applications that handle payment data.

Technical requirements for PCI DSS compliance

7) Restrict Access to Cardholder Data

Implement role-based access controls so that only personnel with a legitimate business purpose can access cardholder data.

8) Identify Users and Authenticate Access

Assign unique IDs to each user and implement multi-factor authentication for administrative access to systems in the cardholder data environment.

9) Restrict Physical Access to Cardholder Data

Secure physical locations where cardholder data is stored or processed using access controls, visitor logs, and monitoring.

10) Log and Monitor Access to Systems and Data

Implement logging mechanisms that capture access to cardholder data and review logs regularly to detect suspicious activity.

11) Test Security Systems and Processes Regularly

Conduct quarterly vulnerability scans using an Approved Scanning Vendor (ASV) and perform annual penetration tests.

12) Maintain an Information Security Policy

Document security policies, communicate them to all personnel, and review and update them at least annually.

Technical requirements for PCI DSS compliance

How to Become PCI Compliant

What steps does your organization follow to achieve compliance?

Achieving PCI compliance follows an assess-remediate-report cycle. The process looks different depending on your compliance level, but the fundamental steps remain consistent.

Step 1. Determine your merchant or service provider level

Calculate your annual transaction volume across all card brands to identify which compliance level applies. Your acquiring bank can help confirm this if you’re uncertain.

Step 2. Identify your SAQ type

There are multiple Self-Assessment Questionnaire types (A, A-EP, B, C, C-VT, D, and others) based on how your systems interact with cardholder data. A business that fully outsources payment handling to a compliant processor typically qualifies for SAQ A, while a business that processes payments on its own servers would complete SAQ D.

Continuous cycle of PCI DSS compliance

Step 3. Complete your self-assessment or audit

Level 1 merchants and service providers require an on-site audit conducted by a Qualified Security Assessor (QSA). Levels 2–4 typically complete the appropriate SAQ, which consists of yes/no questions corresponding to applicable PCI DSS requirements.

Step 4. Submit compliance documentation

Submit your Attestation of Compliance (AOC) and any required reports to your acquiring bank. Some card brands also require direct submission.

Step 5. Address any gaps or remediation items

If your assessment identifies vulnerabilities or missing controls, fix them and document the remediation before final validation.

One of the most effective ways to reduce PCI compliance costs is to minimize your cardholder data environment through tokenization and outsourced payment processing.

PCI Compliance Validation Methods

How do organizations prove they’re PCI compliant?

There’s an important distinction between being compliant (actually meeting the requirements) and validating compliance (documenting proof).

Self-Assessment Questionnaire

An SAQ is a self-validation tool containing yes/no questions that map to applicable PCI DSS requirements. The questionnaire type you complete depends on how your business handles cardholder data—SAQ A is the shortest (for merchants that fully outsource payment handling), while SAQ D is the most comprehensive.

PCI DSS internal assessment vs external audits

Report on Compliance

A Report on Compliance (ROC) is a detailed document produced by a QSA after an on-site audit. Level 1 merchants and service providers typically require an ROC.

Qualified Security Assessors

QSAs are independent security professionals certified by the PCI Security Standards Council to conduct PCI DSS assessments and produce ROCs for Level 1 organizations.

One of the most effective ways to reduce PCI compliance costs is to minimize your cardholder data environment through tokenization and outsourced payment processing.

How Much Does PCI Compliance Cost

What factors influence the cost of achieving and maintaining compliance?

PCI compliance costs vary widely based on your compliance level, current security posture, and the scope of your cardholder data environment. A Level 4 merchant using a hosted payment page might spend a few hundred dollars annually, while a Level 1 enterprise could invest six figures.

Key cost factors include:

  • Compliance level: Higher levels require more extensive audits and documentation
  • Scope of cardholder data environment: More systems handling card data means more controls to implement
  • Current security maturity: Organizations starting from scratch face higher implementation costs
  • Use of third-party services: Outsourcing payment handling to a compliant processor can dramatically reduce scope

One of the most effective ways to reduce PCI compliance costs is to minimize your cardholder data environment through tokenization and outsourced payment processing.

economics of pci dss compliance

Is PCI Compliance Required By Law

Is PCI DSS a Legal Requirement or a Contractual Obligation?

PCI DSS is not a federal law in the United States, but it functions as a de facto requirement through contractual obligations. Your merchant agreement with your acquiring bank almost certainly mandates PCI compliance, and card brands enforce the standard through their network rules.

Some U.S. states—including Nevada, Minnesota, and Washington—have enacted laws that incorporate PCI DSS standards. Additionally, data breach notification laws in many jurisdictions may reference PCI compliance when determining whether a business exercised reasonable security practices.

PCI Compliance for Recurring Billing and Subscription Businesses

What unique challenges do subscription businesses face with PCI compliance?

Subscription and recurring billing businesses face distinct PCI considerations because they typically store payment credentials for ongoing charges. This creates a persistent cardholder data environment that requires continuous protection.

Storing payment methods for auto-pay

When customers enroll in auto-pay, their card data is stored securely for future transactions. Storing card data yourself dramatically increases your PCI scope and compliance burden.

Challenges with PCI DSS compliance for recurring billing platforms

Tokenization and scope reduction

Tokenization replaces sensitive card data with non-sensitive tokens that have no exploitable value if breached. When you use a PCI-compliant payment processor with tokenization, the processor stores the actual card data while you store only the token. This approach can reduce your SAQ from the comprehensive SAQ D to the much simpler SAQ A.

Managing compliance across payment retries and refunds

Automated retry logic for failed payments, card-on-file updates, and refund processing all occur within PCI-compliant systems. Billing platforms with native payment gateway integrations handle these workflows automatically, keeping sensitive data within the processor’s environment.

Best Practices for Maintaining PCI Compliance

How can organizations maintain compliance on an ongoing basis?

PCI compliance isn’t a one-time achievement—it’s a continuous process that requires ongoing attention. Security threats evolve, systems change, and controls can degrade over time without active maintenance.

Conduct regular vulnerability scans

Use an Approved Scanning Vendor (ASV) for quarterly external vulnerability scans. Perform internal scans after any significant changes to your environment.

Monitor access logs continuously

Implement automated log monitoring and alerting to detect unauthorized access attempts in real time.

Train employees on security policies

Require annual security awareness training for all staff. Provide role-specific training for personnel who handle cardholder data.

Review and update policies annually

Conduct a formal annual review of your information security policies. Update them to reflect changes in your business operations or the threat landscape.

Work with PCI-compliant vendors

Verify that third-party service providers maintain their own PCI compliance. Request and review their Attestations of Compliance annually.

How a PCI-Compliant Billing Platform Simplifies Credit Card Compliance

How can your billing infrastructure reduce your PCI compliance burden?

Using a billing platform with pre-built integrations to PCI-compliant payment gateways allows you to offload card handling and significantly reduce your compliance scope. Platforms with tokenization, automated payment retries, and secure card vaulting manage sensitive data without exposing your systems to cardholder information.

For subscription businesses, this means you can support auto-pay, handle failed payment recovery, and process refunds—all while maintaining a minimal PCI footprint.

Frequently Asked Questions

How long does it typically take to achieve initial PCI compliance?

The timeline varies based on your current security posture and compliance level. Small merchants using SAQ A might complete the process in a few weeks, while Level 1 organizations requiring full audits often require several months.

What is the difference between PCI DSS compliance and SOC 2 compliance?

PCI DSS specifically addresses credit card data security and is required for payment processing. SOC 2 is a broader framework for demonstrating security, availability, and confidentiality controls over customer data.

Does using a payment processor like Stripe eliminate all PCI requirements?

Using a compliant processor significantly reduces your scope, but you still complete the appropriate SAQ and maintain secure practices for any systems that interact with payment data.

How often does an organization revalidate PCI compliance?

PCI compliance requires annual validation through an SAQ or audit, plus quarterly vulnerability scans for most merchants and service providers.

How do subscription businesses determine which SAQ type applies to their billing model?

The SAQ type depends on how your systems interact with cardholder data. Subscription businesses that fully outsource payment handling to a compliant processor typically qualify for SAQ A or SAQ A-EP.

Steve Keifer

Steve Keifer has worked in the fintech and SaaS segment over the past 20 years in areas such as treasury management, accounts payable, electronic payments, financial reporting, and accounts receivable software. At Ordway, Steve's leads the company's go-to-market strategy, including the company's research practice which publishes studies on pricing strategies, SaaS metrics, and recurring revenue business models.