The Payment Card Industry Data Security Standard (PCI DSS) protects cardholder data across merchants, service providers and payment processors. Whether you're Level 1 or Level 4, we help you implement all 12 requirements with clear evidence and audit readiness.
The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment. It's managed by the PCI Security Standards Council, founded by major card brands (Visa, Mastercard, American Express, Discover, JCB).
Why this matters now: PCI DSS v4.0 became mandatory March 31, 2024. The updated standard introduces customized implementation approaches, expanded MFA requirements and e-commerce protections against payment page skimming attacks.
Enforced by payment brands and acquiring banks
Annual assessments, quarterly scans, ongoing controls
Merchants
Any organization accepting payment cards (all volumes)
Service providers
Entities processing, storing or transmitting CHD on behalf of others
Payment processors
Third parties processing card transactions
Payment gateways
E-commerce platforms handling card data
Hosting providers
Infrastructure hosting CDE systems
Payment applications
Software vendors with PA-DSS/PCI SSF validated applications
Concrete capabilities that address each requirement's controls
Track where cardholder data (CHD) flows across systems. Map primary account numbers (PAN), sensitive authentication data and service codes to identify storage locations, transmission paths and retention periods.
Addresses: Requirement 3: Protect stored cardholder data, Requirement 4: Encrypt transmission
Document network architecture showing cardholder data environment (CDE) boundaries. The platform maintains network diagrams, firewall rules and segmentation controls for Requirements 1 and 2.
Addresses: Requirement 1: Install and maintain network security controls, Requirement 2: Apply secure configurations
Manage user access to CDE systems with role-based controls. Track authentication mechanisms, multi-factor authentication deployment and unique ID assignment for Requirement 8 compliance.
Addresses: Requirement 7: Restrict access, Requirement 8: Identify users and authenticate access
Track patch management, antivirus deployments and secure development practices. The platform maintains vulnerability scan results, remediation timelines and secure coding evidence.
Addresses: Requirement 5: Protect systems from malware, Requirement 6: Develop and maintain secure systems
Centralize audit log retention, review schedules and intrusion detection system (IDS) configurations. Generate evidence for log analysis, file integrity monitoring and security event correlation.
Addresses: Requirement 10: Log and monitor access, Requirement 11: Test security regularly
Maintain the full PCI DSS policy suite with version control and approval workflows. Document incident response plans, security awareness training and annual risk assessments.
Addresses: Requirement 12: Support information security with policies, Requirement 9: Restrict physical access
All compliance activities are tracked with timestamps, assigned owners and approval workflows. This audit trail demonstrates continuous compliance rather than point-in-time documentation.
VerifyWise provides dedicated tooling for all 12 requirements across 6 security goals
PCI DSS requirements
Requirements with dedicated tooling
Coverage across all security goals
Firewalls, encryption, secure configs
Storage, transmission, disposal
Patching, antivirus, secure dev
Authentication, authorization, physical
Logging, testing, incident response
Security policy, assessments
Track CHD flows and CDE boundaries with automated discovery
Quarterly external vulnerability scan tracking and remediation
Evidence packages for QSA audits or self-assessments
Crosswalk to SOC 2, ISO 27001 and NIST CSF requirements
Organized under 6 security goals for comprehensive cardholder data protection
Firewalls and routers protect the cardholder data environment
Vendor defaults are changed, unnecessary services disabled
CHD storage minimized, PAN masked, encryption applied
Encryption over open, public networks
Antivirus, anti-malware deployed and maintained
Security patches, secure development practices
Need-to-know access, role-based controls
Unique IDs, multi-factor authentication
Physical security controls for systems and media
Audit trails, log review processes
Vulnerability scans, penetration testing
Security policy, risk assessment, incident response
Major updates from v3.2.1 to v4.0 effective March 31, 2024
Transition timeline: v3.2.1 retired March 31, 2024. All entities must validate compliance to v4.0. Some requirements have future effective dates through March 31, 2025 (designated as "best practice until then").
Requirements vary based on annual transaction volume
Validation requirements
Penalty risk
Highest risk: $5K-$100K/month fines, card brand penalties
Validation requirements
Penalty risk
Substantial fines, increased transaction fees
Validation requirements
Penalty risk
Fines up to $50K/month, reputation damage
Validation requirements
Penalty risk
Lower fines but still risk card processing suspension
A practical path to PCI DSS compliance with clear milestones
Card brands and acquiring banks enforce PCI DSS through contractual penalties. Fines escalate with merchant level and duration of non-compliance. Data breaches add investigation, notification and legal costs.
$5,000 - $100,000/month
Levied by card brands for non-compliance or after a breach. Fines increase with merchant level and duration of non-compliance.
Escalation path
Level 1 merchants face highest fines; can reach $100K/month indefinitely until compliance restored
$0.01 - $0.10 per transaction
Acquirers may impose fee increases for non-compliant merchants. Over thousands of monthly transactions, this creates substantial operational cost.
Escalation path
Permanent fee increase until compliance validated; impacts profit margins directly
Immediate termination
Acquiring banks may terminate the merchant agreement, prohibiting card acceptance entirely. Represents existential threat to many businesses.
Escalation path
Reinstatement requires full compliance validation and finding new acquirer (difficult with history)
$200 - $500 per compromised record
Data breach costs include forensics, notification, legal fees, card reissuance and fraud losses. Average total cost: $4M+ per breach.
Escalation path
Class action lawsuits, regulatory penalties (GDPR, state laws), reputational damage, customer churn
Access ready-to-use payment security policy templates aligned with PCI DSS v4.0, SOC 2 and ISO 27001 requirements
Common questions about PCI DSS compliance
Start your compliance journey with our guided assessment and implementation tools.