SecurityWall Logo
Payment Card Security Compliance

PCI DSS Compliance Services for Merchants and Service Providers

End-to-end PCI DSS v4.0 compliance — from scope reduction and gap analysis through required penetration testing, segmentation testing, SAQ submission, and Level 1 ROC engagement support. Built for e-commerce, fintech, SaaS, and any organization that touches cardholder data.

  • PCI DSS v4.0 gap analysis and scope reduction
  • Required external & internal penetration testing in-house
  • SAQ support for all 9 types and Level 1 ROC coordination
  • OSCP, OSWE, CISSP & CREST certified team
Reviewed by the SecurityWall Compliance TeamOSCP · OSWE · CISSP · CREST certified

What Is PCI DSS and Why Is It Mandatory?

PCI DSS — the Payment Card Industry Data Security Standard — is a global standard maintained by the PCI Security Standards Council (an industry body founded by Visa, Mastercard, American Express, Discover, and JCB). It defines the security controls that any organization handling cardholder data must implement. Compliance is not government-regulated — it's contractually required by the card brands and your acquiring bank. Falling out of compliance can lead to fines (typically $5K–$100K per month), forced upgrades to a higher merchant level, increased transaction fees, suspension of your ability to process card payments, and significant reputational damage if a breach occurs while non-compliant. The current version is PCI DSS v4.0.1 — v3.2.1 was officially retired on March 31, 2024, and future-dated v4.0 requirements continue phasing in through March 31, 2025.

Who Needs PCI DSS Compliance?

PCI DSS applies to any entity in the cardholder data flow. The most common cases:

E-commerce merchants

Anyone accepting card payments online — even if you outsource payment to Stripe, Shopify, or similar (you're still responsible for SAQ A or A-EP).

Brick-and-mortar retail and POS

Card-present merchants using physical terminals, integrated POS systems, or virtual terminals.

Service providers

Any organization that stores, processes, or transmits cardholder data on behalf of others — including hosting, MSSPs, dev shops handling integrations, gateways.

SaaS in payments

Payment platforms, billing tools, subscription managers, marketplaces — almost always Level 1 or Level 2 service providers with significant scope.

Fintech and neobanks

Issuers, acquirers, and processors face the most stringent requirements alongside parallel banking regulation.

Call centres and BPOs

Any operation that takes card numbers verbally or processes refunds/payments — often overlooked, with significant scope when not architected for compliance.

The trap most organizations fall into: assuming "we use Stripe so we don't need PCI DSS." You still need to attest — typically with SAQ A or SAQ A-EP. Outsourcing reduces scope dramatically, but it does not eliminate the obligation to demonstrate compliance.

PCI DSS Merchant Levels Explained

Your merchant level is determined by your annual transaction volume per card brand. Each level has different validation requirements — knowing yours is the first step in scoping a compliance program.

LevelAnnual TransactionsValidation Required
Level 1Over 6 million per year (or any merchant who has had a breach)Annual onsite assessment by a QSA, producing a Report on Compliance (ROC) + Attestation of Compliance (AOC) + quarterly ASV scans.
Level 21 million to 6 million per yearAnnual SAQ + AOC + quarterly ASV scans. May require QSA-led validation for some card brands.
Level 320,000 to 1 million e-commerce transactions per yearAnnual SAQ + AOC + quarterly ASV scans.
Level 4Fewer than 20,000 e-commerce or up to 1 million in other channelsAnnual SAQ + AOC. Quarterly ASV scans typically required by acquiring bank.

Service providers have a separate scheme: Level 1 service providers process more than 300,000 transactions annually and require a QSA-led ROC. Level 2 service providers (under 300,000) typically complete SAQ-D for Service Providers. Service providers face stricter requirements than merchants in several areas — including 6-monthly segmentation testing.

The 12 PCI DSS Requirements

PCI DSS v4.0 contains 12 high-level requirements organized into 6 control objectives. Each requirement breaks down into dozens of specific sub-requirements.

1

Network Security Controls

Install and maintain firewalls and other network security devices. Define rulesets, inbound/outbound restrictions.

2

Secure Configurations

Apply hardened baseline configs to all system components. No vendor defaults for passwords, services, or settings.

3

Protect Stored Account Data

Strong cryptography for stored cardholder data. PAN truncated, masked, or tokenized wherever possible.

4

Encrypt Transmission

Strong cryptography (TLS 1.2+) over open and public networks. Trusted certificates only.

5

Anti-Malware

Endpoint protection against malware, regular signature updates, periodic evaluation of evolving threats.

6

Secure Software Development

Secure development lifecycle, code review, vulnerability remediation. Custom and bespoke code requirements in v4.0.

7

Restrict Access by Need-to-Know

Role-based access control, default-deny, documented access rights tied to job function.

8

Identify and Authenticate

Unique IDs for all users. MFA across the CDE for all users (v4.0 expansion). Strong password policy.

9

Restrict Physical Access

Physical security controls for facilities, media, devices. Visitor logs, secure disposal.

10

Log and Monitor

Comprehensive logging, daily log review, SIEM, log retention 12+ months. Alerting on critical events.

11

Test Security Regularly

Quarterly ASV scans, internal vuln scans, annual penetration testing, segmentation testing, payment page integrity (v4.0).

12

Information Security Policy

Overall information security policy, risk assessments, incident response plan, security awareness training.

SAQ vs ROC — Which Validation Path?

The validation path depends on your merchant level and how you handle cardholder data. There are 9 SAQ types — picking the wrong one creates real audit risk.

SAQWho Uses It
SAQ AE-commerce merchants who fully outsource cardholder data handling — e.g. redirect/iframe to Stripe Checkout, PayPal Hosted Pages.
SAQ A-EPE-commerce with partial outsourcing (e.g. Stripe Elements, Adyen direct integration) where the merchant page can affect security of the payment.
SAQ BMerchants using imprint machines or standalone dial-out payment terminals with no electronic storage.
SAQ B-IPMerchants using IP-connected standalone payment terminals (no electronic storage).
SAQ C-VTMerchants using web-based virtual terminals on a dedicated, isolated computer.
SAQ CMerchants with payment application systems connected to the internet — but not storing cardholder data.
SAQ D — MerchantAll other merchants. The most comprehensive SAQ. If your environment doesn't fit one of the simpler types, you complete SAQ D.
SAQ D — Service ProviderService providers eligible for SAQ validation (under 300K transactions). Even more comprehensive than SAQ D Merchant.
SAQ P2PEMerchants using a PCI-listed Point-to-Point Encryption (P2PE) solution. Significantly reduces scope.

A ROC (Report on Compliance) is required for all Level 1 merchants and Level 1 service providers. It's a comprehensive onsite assessment performed by a Qualified Security Assessor (QSA), typically running 1–3 weeks of fieldwork plus several weeks of report drafting. SecurityWall does not issue ROCs ourselves — that requires a QSA firm — but we prepare you for the ROC engagement and coordinate directly with your chosen QSA throughout the assessment.

PCI DSS v4.0 — What Changed

v4.0 is the biggest update to PCI DSS in a decade. v3.2.1 was retired on March 31, 2024, and future-dated v4.0 requirements continue to come into force through March 31, 2025. The most operationally significant changes:

MFA expansion

MFA now required for ALL users with access to the cardholder data environment (CDE), not just administrative access. This applies to engineers, support staff, and anyone with logical access to in-scope systems.

Customized approach option

Organizations can now meet a control's objective using their own approach (with documented Targeted Risk Analysis and QSA review) instead of the prescribed Defined Approach. Powerful for mature security programs but adds documentation overhead.

Stronger authentication

Minimum password length increased to 12 characters with complexity requirements. System and application accounts have stricter management controls.

Payment page integrity (Req 6.4.3 / 11.6.1)

Targets Magecart-style attacks. Requires inventory and integrity monitoring of all scripts loaded on payment pages, with tamper detection. Operationally significant for any e-commerce site using third-party scripts on the checkout page.

Targeted Risk Analysis (TRA)

Required for many controls where v4.0 allows organization-defined timing or scope. TRA must be documented, approved, reviewed annually.

Authenticated internal vulnerability scans

Internal scans must now be performed with credentials to detect issues that anonymous scans miss.

Segmentation testing cadence

Service providers must perform segmentation testing every 6 months (was annually). Merchants remain annual. Critical for any architecture relying on segmentation to reduce CDE scope.

Our 5-Step PCI DSS Process

We deliver PCI DSS programs for merchants, service providers, and platforms across e-commerce, fintech, and SaaS. The process is built around scope reduction and audit-ready evidence collection from day one.

1

Scope & Gap Assessment

2–4 weeks

We map every cardholder data flow, define the CDE, identify all connected and impactful systems, and score every applicable PCI DSS requirement against your current state. The output is a control-by-control gap report and an explicit SAQ-type recommendation (or ROC scoping if Level 1).

2

Scope Reduction & Roadmap

1–3 weeks

Before remediation, we look for scope reduction opportunities — tokenization, hosted payment pages, P2PE, segmentation. Reducing the CDE often saves more cost than remediating its gaps. The roadmap then prioritises remaining gaps by risk and audit blocker.

3

Implementation

3–9 months

We work alongside your team to deploy required controls — segmentation, MFA across the CDE, logging and monitoring, secure config baselines, payment-page integrity monitoring (v4.0 Req 6.4.3 / 11.6.1), policies, and evidence collection automation.

4

Penetration Testing & Validation

2–4 weeks

Required external and internal penetration testing by our OSCP-led team (Req 11.4), segmentation testing (Req 11.4.5), authenticated internal vulnerability scans, and ASV scan coordination. Findings remediated and re-tested. The pentest report becomes formal PCI DSS evidence.

5

SAQ Submission or ROC Engagement

1–8 weeks

For SAQ paths, we complete the questionnaire and Attestation of Compliance with you and submit to your acquiring bank. For Level 1 ROC engagements, we prepare evidence packs, conduct mock audits, and coordinate directly with your chosen QSA throughout fieldwork.

Why SecurityWall for PCI DSS

PCI DSS is the rare compliance framework that explicitly mandates penetration testing — and the quality of that testing matters. A PCI pentest report from a generic compliance shop often won't hold up against scrutiny from a real attacker, or even a competent QSA. We build the security program AND test it ourselves.

Required pen testing in-house

Our team holds OSCP, OSWE, CISSP, and CREST certifications. Req 11.4 external and internal penetration testing, segmentation testing, and authenticated internal vulnerability scans — all delivered by the same team that built your controls. No outsourcing.

Scope reduction expertise

We've designed payment architectures across e-commerce, marketplaces, SaaS billing, and fintech platforms. Often the biggest cost savings come from reducing CDE scope before remediation begins — not after.

v4.0 expertise

We have run organizations through the v3.2.1 → v4.0 transition. We know which future-dated requirements bite hardest, how to interpret the customized approach, and how to operationalise payment-page integrity monitoring.

Audit-ready deliverables

Every policy, procedure, and report we produce is structured as PCI DSS evidence. We know what QSAs accept, what they push back on, and what auditors flag. ROC engagement support included.

vCISO and ongoing maintenance

PCI DSS is annual — and v4.0 introduces new continuous controls like payment-page integrity monitoring. We provide vCISO support and ongoing advisory to keep you compliant between assessments.

PCI DSS Alongside SOC 2 and ISO 27001

Most organizations needing PCI DSS also need SOC 2 (for enterprise customers) or ISO 27001 (for international markets). The control overlap is significant — many PCI DSS controls map directly to SOC 2 Common Criteria and ISO 27001 Annex A. Running them as separate programs duplicates effort. We deliver SOC 2, ISO 27001, and PCI DSS in a unified compliance program where each shared control is implemented and evidenced once across all three frameworks.

Frequently Asked Questions

Common questions about PCI DSS compliance

What is PCI DSS compliance?

PCI DSS — the Payment Card Industry Data Security Standard — is a global security standard maintained by the PCI Security Standards Council (PCI SSC). It applies to any organization that stores, processes, or transmits cardholder data, including merchants, service providers, processors, acquirers, and issuers. Compliance is contractually required by the major card brands (Visa, Mastercard, Amex, Discover, JCB) and your acquiring bank — not by government regulation. The current version is v4.0.1, which fully replaced v3.2.1 on March 31, 2024. Future-dated v4.0 requirements continue to come into force through March 31, 2025.

What are the 4 PCI DSS merchant levels?

Merchant levels are determined by annual transaction volume per card brand: Level 1 — over 6 million transactions per year (or any merchant who has had a breach); requires an annual onsite assessment by a Qualified Security Assessor (QSA) producing a Report on Compliance (ROC). Level 2 — 1 million to 6 million transactions; typically completes a Self-Assessment Questionnaire (SAQ) plus quarterly ASV scans. Level 3 — 20,000 to 1 million e-commerce transactions; SAQ + ASV scans. Level 4 — fewer than 20,000 e-commerce transactions or up to 1 million in other channels; SAQ + ASV scans. Service providers have a separate Level 1 (300,000+ transactions, ROC required) and Level 2 (under 300,000, SAQ-D for Service Providers).

What are the 12 PCI DSS requirements?

The 12 requirements are organized into 6 control objectives. Build and Maintain a Secure Network: (1) Install and maintain network security controls; (2) Apply secure configurations to all system components. Protect Account Data: (3) Protect stored account data; (4) Protect cardholder data with strong cryptography during transmission. Maintain a Vulnerability Management Program: (5) Protect all systems against malicious software; (6) Develop and maintain secure systems and software. Implement Strong Access Control: (7) Restrict access to system components and cardholder data by business need to know; (8) Identify users and authenticate access; (9) Restrict physical access. Regularly Monitor and Test Networks: (10) Log and monitor all access; (11) Test security of systems and networks regularly. Maintain an Information Security Policy: (12) Support information security with organizational policies and programs.

What is the difference between SAQ and ROC?

A SAQ (Self-Assessment Questionnaire) is a self-attestation that the merchant or service provider completes themselves; it's used by lower-volume Levels 2-4 and for some Level 1 service providers. A ROC (Report on Compliance) is a comprehensive onsite assessment performed by a QSA — required for all Level 1 merchants and Level 1 service providers. Both produce an Attestation of Compliance (AOC) that you submit to your acquiring bank or card brands. There are 9 SAQ types (A, A-EP, B, B-IP, C, C-VT, D-Merchant, D-Service Provider, P2PE) — choosing the right one depends on how you handle cardholder data.

Is penetration testing required for PCI DSS?

Yes. PCI DSS Requirement 11.4 mandates annual external and internal penetration testing for all entities, plus testing after any significant change in scope or infrastructure. v4.0 also explicitly requires segmentation testing every 6 months for service providers (annually for merchants) to validate that the cardholder data environment (CDE) is properly isolated from out-of-scope networks. The test must be performed by a qualified internal resource or a qualified third party — and must follow an industry-accepted methodology (PTES, NIST SP 800-115, OWASP). SecurityWall's OSCP-led team delivers pentest reports specifically structured for PCI DSS evidence requirements.

What changed between PCI DSS v3.2.1 and v4.0?

Major changes: (1) explicit support for customized approaches to meeting controls (in addition to defined approaches); (2) MFA required for all access to the cardholder data environment, not just admins; (3) password length increased to 12+ characters with complexity; (4) targeted risk analysis required for many controls; (5) tighter requirements around payment page scripts (Req 6.4.3 / 11.6.1) targeting Magecart-style attacks; (6) authenticated internal vulnerability scans required; (7) enhanced segmentation testing cadence. v3.2.1 retired on March 31, 2024; future-dated v4.0 requirements continue to phase in through March 31, 2025.

How long does PCI DSS compliance take?

Timeline depends on merchant level, current security posture, and SAQ vs ROC path. A gap assessment takes 2–4 weeks. Remediation typically takes 3–9 months for organizations starting from low maturity. SAQ submission can follow immediately after remediation. For Level 1 ROC, the QSA performs a 1–3 week onsite assessment after remediation, and the ROC is typically delivered within 4–8 weeks after fieldwork. End-to-end, most merchants and service providers target 6–12 months from kickoff to first AOC.

What is scope reduction and why does it matter?

PCI DSS only applies to systems that store, process, or transmit cardholder data — the cardholder data environment (CDE) — plus any system connected to or able to impact the CDE. Scope reduction means architecting your environment so the CDE is as small as possible, dramatically reducing audit cost and ongoing compliance burden. Common techniques: tokenization (replace card data with non-sensitive tokens), point-to-point encryption (P2PE), outsourcing card capture to a PCI-compliant provider (like Stripe Elements or hosted iframes), and strong network segmentation. Validating segmentation is itself a Requirement 11.4 control.

Ready to Start Your PCI DSS Program?

Book a free initial consultation. We'll baseline your current state, scope your CDE, identify reduction opportunities, and give you a realistic timeline and budget.

Schedule a Free Consultation