Compliance & Regulations

What Is PCI DSS?

PCI DSS (Payment Card Industry Data Security Standard) is a global, mandatory data security standard that regulates how entities store, process, and transmit cardholder data (CHD) and sensitive authentication data (SAD).

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

PCI DSS (Payment Card Industry Data Security Standard) is a global, mandatory data security standard that regulates how entities store, process, and transmit cardholder data (CHD) and sensitive authentication data (SAD). Established and maintained by the PCI Security Standards Council (governed by major payment card brands: Visa, Mastercard, American Express, Discover, JCB), PCI DSS defines security requirements to protect payment account data and applies to all merchants, processors, acquirers, issuers, and service providers handling payment card information. The current version is PCI DSS 4.0.1 (released June 2024), with major requirement changes effective March 31, 2025.

How Does PCI DSS Work?

PCI DSS operates through 12 security requirements that organizations must implement to protect cardholder data throughout its lifecycle.

The 12 PCI DSS Requirements

Requirement 1 mandates installation and maintenance of network security controls including firewalls. Organizations must implement firewalls that control incoming and outgoing traffic, create and implement firewall configuration rules, restrict traffic between untrusted networks and cardholder data environment, and document and test firewall rules regularly according to ControlCase analysis from 2024.

Requirement 2 addresses secure defaults. Organizations cannot rely on vendor-supplied defaults for system passwords and security parameters. They must change default credentials and remove unnecessary accounts, disable unnecessary services, ports, and protocols, and implement secure configurations for system components.

Requirement 3 protects stored cardholder data. Organizations must keep stored data to minimum retention limits and render CHD unreadable wherever stored through encryption, masking, hashing, or tokenization. They must implement strong cryptographic standards for data protection and limit access to stored cardholder data.

Requirement 4 protects cardholder data in transit. Organizations must render CHD unreadable during transmission over public networks by implementing TLS/SSL encryption for all communications carrying CHD, using strong encryption and secure protocols, and implementing key management procedures. PCI DSS 4.0 requires TLS 1.2 minimum with TLS 1.3 recommended according to CrowdStrike documentation from 2024.

Requirement 5 protects systems and networks from malware. Organizations must deploy antimalware protection on all systems, use anti-malware software on systems likely to be affected, implement mechanisms to detect and remove malware, update antimalware definitions and scanning engines, and monitor system memory for malware.

Requirement 6 mandates maintenance of secure software development lifecycle. Organizations must develop and maintain secure applications, implement secure coding practices and standards, perform security testing before production deployment, conduct regular vulnerability scans and penetration testing, apply security patches promptly, and implement change management for system modifications.

Requirement 7 restricts access to systems by business need. Organizations must limit access to cardholder data by business need-to-know principle, grant access only to those who need it to perform their job, implement role-based access control, limit access privileges to minimum necessary, and document access provisioning and deprovisioning according to Secureframe analysis from 2024.

Requirement 8 addresses identification and verification of access. Organizations must assign unique user ID to each person with access to CDE, implement multi-factor authentication for all access, strengthen authentication with complex passwords, implement session timeouts and logout procedures, change default passwords immediately, and use secure methods for password reset and recovery.

Requirement 9 restricts physical access to cardholder data. Organizations must restrict physical access to facilities and systems containing CHD, implement video surveillance and access controls for facilities, maintain visitor logs, control and monitor access to all media containing CHD, securely dispose of physical media containing CHD, and maintain audit trails for physical access.

Requirement 10 mandates tracking and monitoring of access to the cardholder data environment. Organizations must implement audit trails to detect and respond to access to CDE, generate, retain, and analyze audit logs, protect audit logs from unauthorized modification, implement centralized logging and log review procedures, generate user activity logs and system event logs, monitor failed access attempts, and log administrative access and privileged activities.

Requirement 11 addresses testing of security systems and processes. Organizations must maintain a policy that addresses information security testing, perform vulnerability scans quarterly and after significant network changes, undergo external penetration testing and vulnerability assessment, perform internal penetration testing, maintain Qualified Security Assessor relationships for assessments, perform Cardholder Data Environment assessments, and implement remediation procedures for identified vulnerabilities.

Requirement 12 mandates maintenance of information security policy. Organizations must establish, publish, and distribute security policy, define data security responsibilities and accountability, communicate security policy to all personnel, maintain and update security policies regularly, implement procedures for security incident response, and ensure vendors and service providers understand security requirements.

PCI DSS Levels and Applicability

Organizations are classified into four levels based on payment transaction volume. Level 1 includes organizations processing over 6 million payment transactions annually such as largest retailers, financial institutions, and payment processors. Level 1 organizations require annual formal audit by Qualified Security Assessor, quarterly network scans, and annual penetration testing according to TechTarget analysis from 2024.

Level 2 includes organizations processing 1 to 6 million payment transactions annually such as large retailers and processors. These organizations require annual self-assessment, quarterly network scans, and annual penetration testing.

Level 3 includes organizations processing 20,000 to 1 million payment transactions annually representing mid-sized merchants. They require annual self-assessment and quarterly network scans or annual penetration testing.

Level 4 includes organizations processing fewer than 20,000 payment transactions annually representing small merchants. These organizations require self-assessment and may qualify for simplified compliance models.

Assessment and Compliance Verification

Level 1 organizations must use Qualified Security Assessors for annual formal audit. QSAs are certified professionals approved by PCI Security Standards Council who must have technical expertise and independence. They provide detailed audit reports and recommendations according to Microsoft Compliance documentation from 2024.

Assessment components include document review of policies, procedures, and configurations, system testing including vulnerability scans and penetration testing, personnel interviews, physical facility inspection, review of logs and audit trails, and testing of controls and safeguards.

Level 1 organizations produce detailed Report on Compliance prepared by QSA. Levels 2 through 4 complete Self-Assessment Questionnaire or ROC depending on service provider relationships. Organizations must maintain documentation of compliance with evidence of scans, patches, and assessments retained.

How Does PCI DSS Differ from Related Compliance Standards?

PCI DSS differs from other data protection standards in focus, scope, and enforcement mechanisms, as shown in the following comparison:

Aspect

PCI DSS v3.2.1

PCI DSS v4.0/4.0.1

HIPAA Security Rule

SOC 2

Mandatory

Yes

Yes

Yes (healthcare)

Voluntary

Primary Focus

Payment data

Payment data + security

PHI in healthcare

Service controls

Requirements

12 requirements

12 requirements

3 categories

5 criteria

MFA Requirement

Admin access only

All CDE access (2025)

Not specified

Per scope

Cost of Non-Compliance

$100,000-$500,000+ per event

$100,000-$500,000+ per event

Up to $100,000 per violation

N/A

Assessment Type

Mandatory for Level 1

Mandatory for Level 1

Ongoing compliance

Audit-based

Compliance Deadline

Retired March 31, 2024

Ongoing (v4.0.1 current)

Ongoing

Voluntary

Applicability

Payment processors

Payment processors

Healthcare/health plans

Service organizations

Source: PCI Security Standards Council, 2024; ControlCase, PCI DSS Comparison, 2024

Version 3.2.1 retired March 31, 2024, while version 4.0/4.0.1 represents the current standard. The major difference from version 3.2.1 is the expansion of MFA requirements to all CDE access effective March 31, 2025, compared to only administrative access previously. HIPAA Security Rule applies to healthcare while PCI DSS applies to payment processing, with different control structures and enforcement mechanisms.

Why Does PCI DSS Matter?

PCI DSS represents mandatory compliance for all organizations accepting payment cards, with significant enforcement and consequences for non-compliance.

Mandatory Enforcement and Global Scope

PCI DSS is mandatory for all merchants globally, enforced by major card brands including Visa, Mastercard, American Express, and Discover. An estimated 10 million or more merchants and service providers worldwide must comply according to market estimates from 2024.

Version 3.2.1 retired March 31, 2024. Version 4.0 was released in March 2022, with version 4.0.1 released June 11, 2024 containing minor updates. Multi-factor authentication becomes mandatory for all CDE access, not just administrative access, on March 31, 2025, representing a critical change for all compliance levels according to Clearly Payments analysis from 2024.

Implementation and Assessment Costs

SMBs average $15,000 to $50,000 for version 4.0 implementation, while enterprises spend $100,000 or more for compliance. Level 1 annual audits cost $20,000 to $75,000, while Levels 2 through 4 self-assessment costs remain minimal. The industry trend shows shift toward cloud-based payment processing to offload compliance burden.

Breach Consequences and Enforcement

Breaches trigger investigations, remediation costs, regulatory penalties, and reputational damage. Visa, Mastercard, and American Express assess fines to acquiring banks for merchant non-compliance, with banks cascading fines to merchants. Non-compliance can result in fines from card brands ranging from $100,000 to $500,000 or more per violation or per month according to PCI Security Standards Council documentation from 2024.

What Are the Limitations of PCI DSS?

PCI DSS faces several challenges related to its one-size-fits-all approach and the gap between compliance and security.

One-Size-Fits-All Approach

A single standard applied globally does not account for regional regulatory differences including GDPR and CCPA. Organizations in different jurisdictions must comply with PCI DSS while also meeting local data protection requirements that may conflict or create additional burden according to Gartner analysis from 2024.

Compliance Theater

Organizations can be technically compliant yet still experience breaches. PCI DSS compliance establishes baseline controls but does not prevent sophisticated attacks. Many breached companies were PCI DSS compliant at the time of breach, demonstrating that compliance does not equal security according to Security Metrics analysis from 2024.

Cost Burden

Significant implementation and assessment costs especially burden small merchants and service providers. Small businesses struggle with compliance costs relative to revenue, with some abandoning card processing rather than investing in required controls.

Legacy System Compatibility

Older payment systems struggle to implement modern requirements including MFA, TLS 1.3, and comprehensive encryption. Organizations face choices between costly system upgrades and accepting non-compliance risk.

MFA Complexity

The 2025 requirement for MFA on all CDE access creates operational challenges, as phone-based MFA is not allowed. Organizations must implement hardware tokens, authenticator apps, or biometric authentication across all systems accessing cardholder data.

Assessment Rigor Variability

QSA audit rigor can vary between assessors and organizations. Some organizations receive minimal audits while others undergo comprehensive reviews, creating inconsistent enforcement of standards.

Supply Chain Risk

Merchants are responsible for vendor compliance, but vendor breaches still impact merchant compliance status. Organizations must assess and monitor third-party service providers but have limited control over vendor security practices.

False Sense of Security

PCI DSS compliance does not prevent sophisticated attacks and still requires defense-in-depth approaches beyond baseline requirements. Organizations cannot rely solely on PCI DSS to protect payment data against determined attackers.

How Does PCI DSS Relate to Regulatory Requirements?

PCI DSS operates as industry self-regulation enforced through contractual obligations rather than statutory requirements.

Statutory and Regulatory Framework

The PCI Security Standards Council, an industry body rather than government agency, establishes the standard. Major card brands including Visa, Mastercard, American Express, Discover, and JCB enforce compliance. The standard is referenced in state data breach notification laws, FTC safeguards rules, and various industry-specific regulations but is not direct government regulation according to PCI Security Standards Council documentation from 2024.

Merchants contractually obligate to comply as a condition of accepting payment cards. This contractual obligation creates enforceable compliance requirements despite the absence of statutory mandates.

PCI DSS v4.0/4.0.1 Key Changes for 2024-2025

Major changes from version 3.2.1 include Requirement 3 data minimization focus reducing stored data, Requirement 4 transition to TLS 1.2 minimum with TLS 1.3 preferred, Requirement 6 enhanced secure development lifecycle requirements, Requirement 8 multi-factor authentication extended to all CDE access effective March 31, 2025, Requirement 10 strengthened logging requirements, and Requirement 12 emphasis on supply chain and third-party risk management according to Clearly Payments analysis from 2024.

The critical deadline of March 31, 2025 makes all future-dated requirements mandatory. Multi-factor authentication is required for all access to CDE, and enforcement begins with card brands potentially assessing fines for non-compliance. Merchants must complete migration from version 3.2.1 to version 4.0/4.0.1 by this deadline, implement all future-dated controls, document compliance through ROC for Level 1 or SAQ for Levels 2 through 4, and maintain ongoing compliance with annual re-assessment according to Secureframe PCI DSS 4.0 guidance from 2024.

Scope Definition for Cardholder Data Environment

The CDE includes systems that store, process, or transmit cardholder data, supporting systems directly connected to or protecting CDE systems, wireless access points serving CDE, and databases and servers containing CHD. The CDE excludes systems completely segregated from systems handling CHD, systems that do not process, store, or transmit CHD, and information kiosks that display non-sensitive information only. Segmentation reduces scope if properly implemented according to Microsoft Compliance documentation from 2024.

Each organization must document and justify its CDE scope, with auditors validating during assessment.

FAQs

Is PCI DSS compliance mandatory for my organization?

Yes, if you accept, store, process, or transmit payment card data. All merchants, payment processors, service providers, and financial institutions handling cardholder data must comply. Exceptions are rare and typically apply only to fully outsourced payment processing where the organization has no contact with cardholder data. Even organizations that outsource payment processing may have compliance obligations depending on their service model.

What is the deadline for PCI DSS v4.0 compliance?

The deadline for implementing all requirements is March 31, 2025. By that date, all future-dated requirements including MFA for all CDE access become mandatory. Organizations must complete migration from version 3.2.1 to version 4.0/4.0.1. Organizations still using version 3.2.1 controls face non-compliance and potential penalties after this deadline.

What happens if my organization fails PCI DSS assessment?

Non-compliance can result in fines from card brands ranging from $100,000 to $500,000 or more per violation or per month, restriction from processing cards, legal liability in breach cases, and reputational damage. Card brands may suspend payment processing until compliance is achieved. Acquiring banks typically cascade these penalties to merchants, creating direct financial consequences.

Does PCI DSS prevent data breaches?

No. PCI DSS compliance establishes baseline security controls but does not prevent determined attackers. Many breached companies were PCI DSS compliant at the time of breach. The standard provides one layer of a defense-in-depth approach but must be supplemented with additional security measures, continuous monitoring, and incident response capabilities.

What are the biggest changes in PCI DSS 4.0 from version 3.2.1?

Major changes include expanded MFA requirements now required for all CDE access rather than just administrative access effective March 31, 2025, TLS 1.2 minimum requirement with TLS 1.3 recommended, enhanced secure development lifecycle emphasis, strengthened supply chain risk management requirements, and increased data minimization focus. These changes reflect evolving threats and modern security practices.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

Leave Training & Simulated Phishing to us.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.