Agency|Insights

PCI DSS Compliance Guide: Levels, Requirements, and How to Become Compliant

Learn how to become PCI compliant with this guide to PCI DSS levels, all 12 requirements, attestation of compliance, and service provider obligations.

Agency Team
Agency Team
·15 min read
Typographic card for PCI DSS Compliance Guide in Compliance Strategy & Roadmaps

We see fintech companies and SaaS platforms wrestle with PCI DSS more than almost any other framework — not because the requirements are unclear, but because scoping decisions made early in the process determine whether compliance costs $20,000 or $200,000.

If your organization processes, stores, or transmits credit card data, you need to become PCI compliant. The Payment Card Industry Data Security Standard (PCI DSS) is not optional for businesses handling cardholder data — it is mandated by the major card brands (Visa, Mastercard, American Express, Discover, and JCB) through your acquiring bank or payment processor. Non-compliance can result in fines ranging from $5,000 to $100,000 per month, increased transaction fees, and ultimately losing the ability to accept card payments.

This guide walks through everything you need to become PCI compliant: the standard's governance, the four compliance levels and what each requires, all 12 PCI DSS requirements with practical implementation guidance, the attestation of compliance process, special considerations for PCI DSS service providers, and how PCI DSS overlaps with SOC 2. Whether you are a PCI Level 3 merchant processing e-commerce transactions or a service provider handling card data on behalf of others, you will find the clarity you need.

What Is PCI DSS?

PCI DSS is a global security standard developed and maintained by the PCI Security Standards Council (PCI SSC), an organization founded by the five major card brands. The standard establishes technical and operational requirements for protecting cardholder data throughout the transaction lifecycle — from the point of capture through processing, transmission, and storage.

The current version, PCI DSS 4.0, was released in March 2022 with a transition period from PCI DSS 3.2.1. As of March 2025, all organizations must comply with PCI DSS 4.0, including the future-dated requirements that were previously optional.

Who Must Comply

PCI DSS applies to any entity that stores, processes, or transmits cardholder data or sensitive authentication data. This includes:

  • Merchants — Any business that accepts card payments, whether online, in-store, or by phone
  • Service providers — Organizations that process, store, or transmit cardholder data on behalf of merchants (payment processors, hosting providers, managed service providers)
  • Acquiring banks — Financial institutions that process card transactions for merchants

The scope extends to all system components that are included in or connected to the cardholder data environment (CDE). Reducing your CDE scope through tokenization, network segmentation, and outsourcing to PCI-compliant processors is one of the most effective strategies for reducing compliance cost and complexity.

PCI DSS Compliance Levels

PCI DSS defines four merchant levels and two service provider levels, each with different validation requirements. Your level is determined by your annual transaction volume and is assigned by your acquiring bank or the card brands directly.

Merchant Levels

LevelAnnual TransactionsValidation Requirements
Level 1Over 6 million (any channel)Annual Report on Compliance (ROC) by QSA, quarterly ASV scans
Level 21-6 millionAnnual Self-Assessment Questionnaire (SAQ), quarterly ASV scans
Level 320,000-1 million e-commerceAnnual SAQ, quarterly ASV scans
Level 4Under 20,000 e-commerce or up to 1 million otherAnnual SAQ, quarterly ASV scans (recommended)

PCI Level 3 is the compliance level with the highest search volume because it captures the broad middle ground of e-commerce businesses — large enough to process meaningful transaction volumes but not large enough to require the full QSA assessment of Level 1. If you are a Level 3 merchant, you will typically complete SAQ A (if you fully outsource cardholder data handling) or SAQ A-EP (if your website can impact the security of payment transactions).

Service Provider Levels

LevelAnnual TransactionsValidation Requirements
Level 1Over 300,000Annual ROC by QSA, quarterly ASV scans
Level 2Under 300,000Annual SAQ-D, quarterly ASV scans

PCI DSS Requirements Overview

PCI DSS 4.0 organizes its requirements into six goals and 12 requirements. Each requirement contains detailed sub-requirements with specific technical and operational controls.

GoalRequirementDescription
Build and Maintain a Secure Network1. Install and maintain network security controlsFirewalls, network segmentation, traffic filtering
2. Apply secure configurations to all system componentsChange defaults, remove unnecessary services, harden systems
Protect Account Data3. Protect stored account dataEncryption, masking, retention limits, key management
4. Protect cardholder data with strong cryptography during transmissionTLS 1.2+, encrypted tunnels, certificate management
Maintain a Vulnerability Management Program5. Protect all systems and networks from malicious softwareAntivirus/anti-malware, application controls, phishing protection
6. Develop and maintain secure systems and softwareSecure SDLC, patch management, code reviews, web application firewalls
Implement Strong Access Control Measures7. Restrict access to system components and cardholder data by business need-to-knowRole-based access, least privilege, access reviews
8. Identify users and authenticate access to system componentsUnique IDs, MFA, password policies, service account management
9. Restrict physical access to cardholder dataFacility controls, visitor management, media destruction
Regularly Monitor and Test Networks10. Log and monitor all access to system components and cardholder dataCentralized logging, log review, audit trail integrity, time synchronization
11. Test security of systems and networks regularlyVulnerability scans (internal/external), penetration testing, IDS/IPS, file integrity monitoring
Maintain an Information Security Policy12. Support information security with organizational policies and programsSecurity policy, risk assessment, security awareness training, incident response

For organizations running file integrity monitoring tools as part of Requirement 11, see our detailed guide on file integrity monitoring for PCI DSS.

Attestation of Compliance (AoC)

The PCI DSS Attestation of Compliance is the formal document that confirms your organization meets PCI DSS requirements. It is what your customers, partners, and acquiring bank will request as proof of compliance.

SAQ Types

Self-Assessment Questionnaires come in several variations based on how you handle cardholder data:

SAQ TypeApplies ToApproximate Questions
SAQ ACard-not-present merchants that fully outsource cardholder data to PCI-compliant third parties~25
SAQ A-EPE-commerce merchants whose website can impact payment transaction security~140
SAQ BMerchants using imprint machines or standalone dial-out terminals~40
SAQ B-IPMerchants using standalone IP-connected PTS terminals~80
SAQ CMerchants with payment application systems connected to the internet~160
SAQ C-VTMerchants using web-based virtual payment terminals~80
SAQ D (Merchant)All other merchants~330
SAQ D (Service Provider)PCI DSS service providers~330

QSA vs. Self-Assessment

Level 1 merchants and Level 1 service providers must engage a Qualified Security Assessor (QSA) to conduct an on-site assessment and produce a Report on Compliance (ROC). A QSA is an individual certified by the PCI SSC who works for a Qualified Security Assessor Company (QSAC).

Levels 2-4 merchants can self-assess using the appropriate SAQ, though many Level 2 merchants voluntarily engage a QSA for added rigor and credibility. When choosing a QSA, look for experience in your industry and technology stack, and verify their certification status on the PCI SSC website.

PCI DSS for Service Providers

If you are a PCI DSS service provider — meaning you process, store, or transmit cardholder data on behalf of merchants — you face additional requirements beyond what merchants must implement.

Additional Service Provider Requirements

  • Requirement 3.5.1.2 — Service providers must use different encryption keys for each customer
  • Requirement 8.3.10.1 — Service providers must change customer passwords at least every 90 days if passwords are the only authentication factor
  • Requirement 11.4.7 — Service providers must support their customers' penetration testing needs
  • Requirement 12.4.1 — Executive management must establish responsibility for protection of cardholder data
  • Requirement 12.9 — Service providers must acknowledge in writing that they are responsible for the security of cardholder data they possess

Service providers completing SAQ D face approximately 330 questions — the most comprehensive self-assessment. Many PCI DSS service provider organizations find that engaging a QSA streamlines the process despite it not being required for Level 2.

How to Become PCI Compliant

Follow this step-by-step implementation path from gap analysis to attestation:

Step 1: Determine Your Level and SAQ Type

Confirm your annual transaction volume with your acquiring bank to establish your merchant or service provider level. Then identify which SAQ applies based on how you handle cardholder data.

Step 2: Define Your Cardholder Data Environment

Map every system, network, and process that stores, processes, or transmits cardholder data. This includes databases, applications, network segments, and any connected systems. The goal is to minimize your CDE through scope reduction techniques.

Step 3: Conduct a Gap Analysis

Assess your current controls against each applicable PCI DSS requirement. Document what is in place, what is partially implemented, and what is missing entirely. Prioritize high-risk gaps (encryption, access controls, logging) first.

Step 4: Remediate Gaps

Implement the technical controls, policies, and procedures needed to address identified gaps. This might include deploying encryption, implementing MFA, establishing log monitoring, or reconfiguring network segmentation.

Step 5: Document and Test

Complete your SAQ or prepare for your QSA assessment. Run required ASV vulnerability scans and penetration tests. Ensure all policies and procedures are documented and evidence is available.

Step 6: Submit Your Attestation

Complete the Attestation of Compliance and submit it to your acquiring bank. Maintain compliance through ongoing monitoring, quarterly ASV scans, and annual reassessment.

PCI DSS and SOC 2

PCI DSS and SOC 2 are complementary frameworks with significant control overlap, particularly in areas like access control, logging, encryption, and change management. Organizations serving both fintech customers and broader enterprise clients often pursue both certifications.

Key differences: PCI DSS is prescriptive (specifying exact requirements like "TLS 1.2 or higher"), while SOC 2 is principles-based (requiring "encryption of data in transit" without specifying the protocol). PCI DSS is specifically about cardholder data protection, while SOC 2 covers your entire security program.

For a detailed exploration of how these frameworks work together, see our guide on SOC 2 and PCI DSS for fintech. Organizations pursuing multiple frameworks should consider a multi-framework compliance strategy to maximize control reuse.

For cloud-specific PCI considerations including Stripe integration and cloud storage, see our guide on PCI compliance for cloud and SaaS.

Ready to streamline your PCI DSS compliance? Contact Agency for a gap assessment and a clear path to your Attestation of Compliance.

Frequently Asked Questions

Agency Team

Agency Team

Agency Insights

Expert guidance on cybersecurity compliance from Agency's advisory team.

LinkedIn

Related Reading

Stay ahead of compliance

Expert insights on cybersecurity compliance delivered to your inbox.

We respect your privacy. Unsubscribe anytime.