PCI DSS is the global security standard for processing cardholder data. Learn how it applies to your organization and what’s needed to prove compliance
Katrina Dalao
Sr. Content Marketing Specialist, CIPM
June 14, 2023
Credit and debit card numbers are some of the most valuable digits linked to an individual. Not only are they equivalent to cash, a recent survey revealed more than 90% of Americans use credit or debit cards as their primary payment method.
If your organization accepts card payments, you may have come across the Payment Card Industry Data Security Standard (PCI DSS).
PCI DSS is a set of security standards to help protect cardholder data during transactions. It pertains to any organization that processes, stores, or transmits credit card information, regardless of its size or number of transactions. (Yes, even if you process a single credit card payment a year, PCI DSS still applies to you!)
In this article, we cover the basics of PCI DSS, its primary goals and requirements, and what you need to prove compliance.
Our latest webinar on PCI DSS walks you through how to streamline and accelerate your road to compliance. Click to watch now.
The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements designed to ensure that all organizations that process, store, or transmit credit card information maintain a secure environment.
It was created by the Payment Card Industry Security Standards Council (PCI SSC), an independent body founded by the major payment card brands, namely American Express, Discover, JCB, MasterCard, and Visa.
The primary goal of PCI DSS is to protect cardholder data during payment card transactions, reducing the risk of breaches and fraud. By establishing standard policies and procedures, PCI DSS provides an actionable framework that prevents, detects, and reacts to security incidents.
PCI DSS applies to all merchants, financial institutions, service providers, and any other organization involved in the payment card ecosystem. Failure to comply can result in fines, penalties, or card processing restrictions.
It's important to note that PCI DSS is not a law. Rather, it’s a global security standard many jurisdictions have elected to incorporate into their regulations. For example, Nevada, Minnesota, and Washington have written portions of the PCI DSS into their state laws. PCI DSS compliance is also a common inclusion in contractual agreements between organizations and payment brands.
Determining how PCI DSS applies to your organization can be complicated. The cards you work with and the number of transactions you process per year determine which PCI DSS controls apply to you. The first step is to find out whether your organization is a merchant, a service provider, or both.
The PCI SSC defines merchants as “any entity that accepts payment cards bearing the logos of any of the five members of PCI SSC (American Express, Discover, JCB, MasterCard, or Visa) as payment for goods and or services.”
While each of the payment brands has its own specific compliance program, merchants are classified into four general levels:
Service providers are defined as “any business entity that is not a payment brand, directly involved in the processing, storage, or transmission of cardholder data on behalf of another entity.”
This includes companies that provide services that control or could impact the security of cardholder data, such as call centers, hosting providers, and network support. Unlike merchants, service providers are only classified into two levels:
If an organization’s service includes storing, processing, or transmitting cardholder data on behalf of other merchants or service providers, then it’s considered both a service provider and a merchant.
For example, an internet service provider is a merchant because it accepts payment cards for monthly billing. But it’s also a service provider if it hosts other merchants as customers.
Regardless of which level you fall under, PCI DSS outlines six goals and 12 requirements to enhance the security of payment card account data:
Build and maintain a secure network and systems
Protect account data
Maintain a vulnerability management program
Implement strong access control measures
Regularly monitor and test networks
Maintain an information security policy
Support information security with organizational policies and programs
Note: Every payment brand will also have its own assessment and audit requirements.
A Qualified Security Assessor (QSA) is an individual certified by the PCI SSC to perform an onsite audit.
Some entities may also sponsor an employee to train as their Internal Security Assessor (ISA). ISAs are able to conduct internal assessments and act as a liaison with an external QSA.
During an audit, the QSA will assess whether the entity has met PCI DSS requirements. This includes scoping or identifying all system components and workflows included in your cardholder data environment, completing the required documentation (more on this in the next section), and other forms of gap analysis or remediation to prepare for the upcoming audit.
While PCI DSS compliance is different for every organization, the process typically involves three types of reporting documentation:
The Self-Assessment Questionnaire (SAQ) is a validation tool for entities that are not required to submit a Report on Compliance (ROC) and eligible to perform their own assessment.
A SAQ is composed of yes-or-no questions. There are eight available SAQ forms for merchants and one for service providers, varying by the type of business activities, transaction methods, or other criteria.
A Report on Compliance (ROC) is the most thorough documentation of compliance, detailing whether the entity meets all 12 standard requirements or if any deficiencies were discovered during the assessment.
ROCs are completed by a QSA after performing the on-site audit, and then submitted to the acquiring bank and payment brand for verification.
An Attestation of Compliance (AOC) is documented evidence of an entity's PCI DSS compliance, affirming that its security practices effectively protect the cardholder’s data. AOCs must be signed by the entity and the QSA (if applicable) and submitted to the acquiring bank or payment brand, along with the SAQ, ROC, and any other requested documentation.
The PCI DSS assessment typically takes six to 12 weeks. The exact duration, however, varies depending on the project’s size, the number of systems, and how many security measures and policies are already in place. (Note that this is only the estimated time for performing PCI SAQs.)
PCI DSS implementation also fluctuates from company to company. As PCI DSS only applies to the infrastructure that contains credit card data, a good way to lower implementation cost and time is by limiting the server storage and management of credit card data as much as possible.
PCI DSS compliance certificates are valid for one year. To maintain compliance, entities are required to complete a self-assessment questionnaire.
If there are any changes in infrastructure or environment, or even a new feature release, that impacts cardholder data, then PCI DSS compliance is no longer valid. The organization will need to revalidate compliance for its current state.
Furthermore, the PCI DSS requirements are frequently updated (with the latest version PCI DSS v4.0 issued March 31, 2022), which requires entities to implement new standards.
Certain entities are required to undergo annual audits in order to maintain PCI DSS compliance. This includes:
The exact frequency of audits, however, depends on the payment brand you choose to work with, as the PCI DSS does not mandate a specific frequency.
The cost for PCI DSS compliance can be divided into three main categories:
While the exact PCI DSS compliance cost depends on the organization, it’s usually based on a few key factors:
In most cases, the cost for PCI DSS compliance can range from at least $20,000 (for startups and small organizations that handle fewer transactions) to upwards of $300,000 for larger enterprises. The exact amount will depend on the factors listed above and your merchant or service provider level.
Despite its numerous benefits, maintaining a PCI DSS compliant system can be a complicated process. OneTrust helps streamline the process with our automated scoping wizard that generates all the required PCI DSS controls, policies, and evidence tasks. Stay continuously compliant with automated evidence collection capabilities that can integrate directly into your tech stack.
With OneTrust Compliance Automation, you can build, scale, and automate your security compliance program, reduce your cost of compliance up to 60%, and obtain certifications 50% faster.
Webinar
This DataGuidance webinar explores the latest and expected developments in the implementation of the NIS 2 Directive, focusing on practical compliance strategies to ensure your organization is prepared.
Webinar
Discover strategies to embed compliance and risk management into business processes with minimal disruption, using technology-driven solutions for efficiency, scalability, and improvement.
Webinar
Join our webinar to learn how to optimize security posture, streamline compliance, and leverage automation to manage IT risk in today's complex digital landscape. Register now!
Webinar
Join our upcoming product release webinar to explore how these new capabilities can help your organization navigate complex frameworks, streamline third-party management, and accelerate AI and data innovation.
Webinar
Join our live demonstration and see how Compliance Automaiton can help boost compliance efficiency with automated workflows, shared evidence, and 40+ frameworks.
Webinar
Master the fundamentals of constructing robust compliance frameworks that can seamlessly integrate with organizational operations while aligning with regulatory and strategic mandates to deliver measurable insights on your progress and gaps.
Webinar
Unlock tech risk management & compliance excellence. Master risk management, build robust frameworks, and foster cross-functional collaboration for long-term resilience.
Webinar
Join us as we explore OneTrust Compliance Automation, a holistic and fully integrated solution that streamlines and optimizes workflows, compliance, and attestation.
Webinar
Join us as Ryan Karlin, Senior Director of Product Marketing highlights important updates from TrustWeek including an inside look into OneTrust's new platform features that make it easier for customers to activate data responsibly, surface and mitigate risk, and navigate the complex regulatory environment.
Report
Download the full OCEG research report for a snapshot of what organizations are doing to govern their AI efforts, assess and manage risks, and ensure compliance with external and internal requirements.
Infographic
Download our infographic to learn about the new DORA regulation, who needs to comply, and how OneTrust can help streamline the process.
Webinar
Join us for a deep dive into embedding privacy by design into the fabric of your business to promote the responsible use of data.
Infographic
Download our infographic to learn the main challenges faced during risk assessments, proven frameworks for assessing risks, and how to translate guidance into action.
Webinar
Join our PCI DSS webinar where we discuss how Certification Automation can help free up valuable InfoSec resources, streamline audits, and stay continuously compliant.
eBook
How can your business use third-party messaging apps while staying compliant? Dive into key usage considerations based on the DOJ’s 2023 guidance.
Webinar
Join our webinar for insights on transforming InfoSec program management. Navigate the complexities of modern security with a flexible, scalable, and cost-effective approach.
Infographic
What key challenges do CISOs face going into the new year? Download this infographic to hear what experts from industries across the board have to say.
eBook
Get your free guide to the NIST Cybersecurity Framework 2.0 and learn how its proposed changes will impact your InfoSec programs.
Resource Kit
Download our NIST CSF Essentials resource kit and master cybersecurity compliance with expert insights, strategies, and real-world case studies.
Webinar
Join our webinar to learn more about the European Data Protection Seal and to find out what the key advantages of getting certified.
Checklist
This SOC 2 checklist provides clear action steps that enable you to mature your security program and fast-track your way to compliance.
Data Sheet
Explore how OneTrust integrations can help you automate compliance with today’s most popular InfoSec frameworks.
Webinar
Join our risk assessments experts as we discuss best practices, program templates, and how provide an assessment that provides the best value for your organization.
Infographic
Learn the ins and outs of Europe’s top InfoSec and cybersec frameworks, including ISO 27001, UK Cyber Essentials, the NIS2 Directive, DORA, and more.
Infographic
Streamline and scale your organization’s InfoSec compliance program by focusing on these five key areas of automation.
eBook
In this free eBook, we explore the basics of three top InfoSec frameworks and how to decide which is the best fit for your organization.
Webinar
Join us for a live demo of OneTrust's third-party risk management solution and see how it can help automate and streamline your TPRM program.
eBook
Download this eBook and get the insights you need to safeguard customer privacy and ensure responsible data use in the information lifecycle.
Webinar
Join our live webinar and hear from security professionals on how to get ISO 27001 certified, streamline audit preparation, and demonstrate security assurance across any regulatory jurisdiction.
eBook
Download our eBook to learn practical advice on how to approach third-party risk management like an InfoSec expert.
Webinar
In this webinar, you will hear first-hand from information security experts experts what are the key pain-points and their strategies to be audit ready.
Webinar
In this webinar, learn how to right-size your compliance scope for different frameworks across various business dimensions and enable an agile audit process.
Webinar
Learn how to enable an agile audit process by breaking down complex InfoSec requirements into actionable tasks to help automate your compliance program.
eBook
Learn how to respond to the security landscape and build a proactive InfoSec program to help your customers and business.
eBook
Ensure your enterprise IT risk assessment is a success with a top-down approach that gets executive buy-in from the start
eBook
As a unified business function, DevSecOps combines rapid software development with top-notch security at scale.
Webinar
Learn how scaling your approach to managing IT assets & risk assessments can deliver a complete picture to better measure and inform program investments.
Webinar
Avoid these 5 critical mistakes when answering security questionnaires and streamline responses with this webinar.
Webinar
Watch this webinar to learn what makes a successful risk management program and how effective security teams build trust.
Webinar
Prepare for privacy and security incidents by building an incident management playbook.