Product
Everything you need to secure code, cloud, and runtime– in one central system
Code
Dependencies
Prevent open-source risks (SCA)
Secrets
Catch exposed secrets
SAST
Secure code as its written
Container Images
Secure images easily
Malware
Prevent supply chain attacks
Infrastructure as Code
Scan IaC for misconfigurations
License Risk & SBOMs
Avoid risk, be compliant
Outdated Software
Know your EOL runtimes
Cloud
Cloud / CSPM
Cloud misconfigurations
DAST
Black-box security testing
API Scanning
Test your API’s for vulns
Virtual Machines
No agents, no overhead
Kubernetes Runtime
soon
Secure your container workloads
Cloud Search
Cloud sprawl, solved
Defend
Runtime Protection
In-app Firewall / WAF
Features
AI AutoFix
1-click fixes with Aikido AI
CI/CD Security
Scan before merge and deployment
IDE Integrations
Get instant feedback while coding
On-Prem Scanner
Compliance-first local scanning
Solutions
Use Cases
Compliance
Automate SOC 2, ISO & more
Vulnerability Management
All-in-1 vuln management
Secure Your Code
Advanced code security
Generate SBOMs
1 click SCA reports
ASPM
End-to-end AppSec
CSPM
End-to-end cloud security
AI at Aikido
Let Aikido AI do the work
Block 0-Days
Block threats before impact
Industries
FinTech
HealthTech
HRTech
Legal Tech
Group Companies
Agencies
Startups
Enterprise
Mobile apps
Manufacturing
Pricing
Resources
Developer
Docs
How to use Aikido
Public API docs
Aikido developer hub
Changelog
See what shipped
Security
In-house research
Malware & CVE intelligence
Learn
Software Security Academy
Trust Center
Safe, private, compliant
Blog
The latest posts
Open Source
Aikido Intel
Malware & OSS threat feed
Zen
In-app firewall protection
OpenGrep
Code analysis engine
Integrations
IDEs
CI/CD Systems
Clouds
Git Systems
Compliance
Messengers
Task Managers
More integrations
About
About
About
Meet the team
Careers
We’re hiring
Press Kit
Download brand assets
Calendar
See you around?
Open Source
Our OSS projects
Customer Stories
Trusted by the best teams
Partner Program
Partner with us
Contact
Login
Start for Free
No CC required
Aikido
Menu
Aikido
EN
EN
FR
JP
DE
PT
Login
Start for Free
No CC required
Learn
/
Compliance Frameworks Hub
/
Chapter 1Chapter 2Chapter 3

PCI DSS

6minutes read150

Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter

TL;DR

If you handle credit card data, PCI DSS is mandatory. Period. It covers how to secure cardholder data (CHD) and sensitive auth data (SAD)—encryption, firewalls, access control, logging, scanning, the whole deal.

Skip it, and you risk fines, breaches, lawsuits, and getting cut off by payment processors. Compliance isn’t optional—it’s survival.

PCI DSS Scorecard Summary:

  • Developer Effort: Moderate to High (Requires secure coding, secure configuration, careful handling of cardholder data, adherence to access controls, supporting vulnerability scans/logging).
  • Tooling Cost: Moderate to High (Firewalls, vulnerability scanners (ASV scans), file integrity monitoring, logging/SIEM, encryption tools, potentially tokenization/P2PE solutions).
  • Market Impact: Critical (Mandatory for any entity handling payment card data; non-compliance can result in inability to process card payments).
  • Flexibility: Low to Moderate (Core requirements are prescriptive, but specific implementation methods can vary; v4.0 introduces more flexibility with the "customized approach").
  • Audit Intensity: High (Requires annual validation via Self-Assessment Questionnaire (SAQ) or formal Report on Compliance (ROC) by a Qualified Security Assessor (QSA), plus quarterly vulnerability scans).

What is PCI DSS?

The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard designed to prevent credit card fraud through increased controls around data handling and storage. It applies to any organization, regardless of size or location, that accepts, processes, stores, or transmits cardholder data (CHD) or sensitive authentication data (SAD).

CHD includes the primary account number (PAN), cardholder name, expiration date, and service code. SAD includes full track data, card verification codes (CVV2, CVC2, etc.), and PINs – SAD must never be stored after authorization.

PCI DSS was created by the major payment card brands (Visa, Mastercard, American Express, Discover, JCB) who formed the PCI Security Standards Council (PCI SSC) to manage the standard. Compliance is enforced by the individual card brands and acquiring banks, not directly by the PCI SSC.

The standard is organized around 6 goals which translate into 12 core requirements (these remain consistent in concept for the newer PCI DSS v4.0):

  1. Build and Maintain a Secure Network and Systems:
    • Req 1: Install and maintain network security controls (firewalls).
    • Req 2: Apply secure configurations to all system components.
  2. Protect Account Data:
    • Req 3: Protect stored account data (e.g., encrypt PAN).
    • Req 4: Protect cardholder data with strong cryptography during transmission over open, public networks.
  3. Maintain a Vulnerability Management Program:
    • Req 5: Protect all systems and networks from malicious software.
    • Req 6: Develop and maintain secure systems and software (patching, secure coding).
  4. Implement Strong Access Control Measures:
    • Req 7: Restrict access to system components and cardholder data by business need-to-know.
    • Req 8: Identify users and authenticate access to system components.
    • Req 9: Restrict physical access to cardholder data.
  5. Regularly Monitor and Test Networks:
    • Req 10: Log and monitor all access to system components and cardholder data.
    • Req 11: Test security of systems and networks regularly (vulnerability scans, penetration tests).
  6. Maintain an Information Security Policy:
    • Req 12: Support information security with organizational policies and programs.

Compliance validation varies based on the volume of transactions processed annually (Merchant Levels 1-4, Service Provider Levels 1-2), ranging from annual Self-Assessment Questionnaires (SAQs) to formal onsite audits by a Qualified Security Assessor (QSA) resulting in a Report on Compliance (ROC). Quarterly external vulnerability scans by an Approved Scanning Vendor (ASV) are typically required. PCI DSS v4.0 is the current version, with requirements becoming mandatory by March 31, 2025.

Why is it Important?

For any business touching payment card data, PCI DSS compliance is absolutely essential:

  • Required for Card Acceptance: It's mandated by the major card brands through contracts with acquiring banks. Non-compliance can lead to the inability to accept card payments.
  • Prevents Data Breaches: Implementing PCI DSS controls significantly reduces the risk of costly cardholder data breaches.
  • Avoids Severe Penalties: Non-compliance can result in substantial monthly fines from acquiring banks/card brands (ranging from $5,000 to $100,000+ per month), even if no breach occurs.
  • Reduces Breach Impact: If a breach does happen, being PCI DSS compliant demonstrates due diligence and can potentially reduce fines, legal liability, and compensation costs (like card re-issuance fees).
  • Builds Customer Trust: Compliance shows customers that you take the security of their payment data seriously, fostering trust and loyalty.
  • Protects Brand Reputation: A card data breach severely damages a company's reputation. PCI DSS helps prevent that.
  • Provides Security Baseline: Offers a strong baseline security framework that benefits the overall security posture of the organization, not just for payment data.

Ignoring PCI DSS is simply not an option for businesses that want to accept payment cards.

What and How to Implement (Technical & Policy)

Implementing PCI DSS involves addressing all 12 core requirements through technical controls and documented policies/procedures. Key areas impacting development and operations include:

  1. Secure Network (Req 1 & 2):
    • Implement and maintain firewalls to segment the Cardholder Data Environment (CDE) from other networks.
    • Use secure configurations: change vendor defaults, disable unnecessary services/ports, harden systems. Evidence: Firewall rulesets, configuration standards, network diagrams.
  2. Protect Cardholder Data (Req 3 & 4):
    • Minimize storage: Don't store cardholder data unless absolutely necessary. Never store SAD post-authorization.
    • Mask PAN: Mask the Primary Account Number (PAN) when displayed (only first 6/last 4 digits visible).
    • Encrypt PAN: Render stored PAN unreadable using strong cryptography (e.g., AES-256) and robust key management.
    • Encrypt transmission: Encrypt CHD during transmission over open/public networks (use strong TLS versions, secure protocols). Evidence: Data retention policy, data flow diagrams, encryption config, key management procedures.
  3. Vulnerability Management (Req 5 & 6):
    • Anti-malware: Deploy and regularly update anti-malware solutions on systems commonly affected by malware.
    • Patching: Implement a process to identify and apply security patches promptly (within defined timeframes for critical patches).
    • Secure Coding: Develop software applications (internal or bespoke) based on secure coding guidelines (e.g., OWASP), train developers, address common coding vulnerabilities (injection, XSS, etc.). Evidence: Patch management records, secure coding policy, developer training records, SAST/DAST results.
  4. Access Control (Req 7, 8, 9):
    • Least Privilege/Need-to-Know: Restrict access to CHD and system components based on job role and minimum necessary permissions.
    • Unique IDs & Authentication: Assign unique IDs for access; implement strong authentication (complex passwords/passphrases, MFA - especially for CDE access).
    • Physical Security: Secure physical access to systems storing/processing CHD. Evidence: Access control policies, RBAC configuration, MFA settings, password policy, physical access logs.
  5. Monitoring & Testing (Req 10 & 11):
    • Logging: Implement detailed audit logging for all system components; track access to network resources and CHD. Secure logs from tampering. Use time synchronization (NTP).
    • Log Review: Regularly review logs for suspicious activity.
    • Vulnerability Scanning: Perform quarterly external ASV scans and internal vulnerability scans. Address vulnerabilities.
    • Penetration Testing: Conduct annual internal/external penetration tests (and after significant changes).
    • Intrusion Detection/Prevention: Implement IDS/IPS.
    • Change Detection: Use file integrity monitoring (FIM) for critical files. Evidence: Log review procedures, SIEM configuration, ASV scan reports, pentest reports, FIM logs.
  6. Information Security Policy (Req 12):
    • Maintain a comprehensive information security policy, review annually, distribute to relevant personnel.
    • Define security responsibilities, conduct awareness training.
    • Implement an incident response plan and test it. Evidence: InfoSec policy document, training records, incident response plan & test results.

PCI DSS v4.0 introduces updates like stronger password/MFA requirements, broader applicability of controls, new requirements for phishing prevention and script security on payment pages, and allows for a "customized approach" to meeting requirements under specific conditions, alongside the traditional "defined approach."

Common Mistakes to Avoid

Achieving and maintaining PCI DSS compliance is often challenging. Avoid these common errors:

  1. Incorrect Scoping: Failing to accurately identify all systems, networks, and applications that store, process, or transmit CHD, or could impact the security of the CDE. This is the most critical mistake.
  2. Storing Sensitive Authentication Data (SAD): Illegally storing CVV2, full track data, or PIN data after authorization.
  3. Inadequate Data Protection: Storing unencrypted PANs, using weak encryption/key management, or transmitting CHD over insecure channels.
  4. Weak Access Control: Using shared/default credentials, lacking MFA for CDE access, not enforcing least privilege, failing to revoke access promptly.
  5. Insufficient Logging & Monitoring: Not logging relevant events, not reviewing logs regularly, or not protecting logs from tampering.
  6. Ignoring Vulnerability Management: Skipping quarterly ASV scans, failing internal scans, not patching critical vulnerabilities promptly.
  7. Poor Secure Coding Practices: Developing applications with common vulnerabilities (SQLi, XSS) that expose CHD.
  8. Neglecting Policies & Procedures: Lacking documented policies, procedures, or an incident response plan, or failing to train employees.
  9. Vendor Compliance: Assuming third-party service providers are compliant without verifying or having proper contractual agreements.
  10. Treating Compliance as Annual: Viewing PCI DSS as just a yearly audit/SAQ instead of a continuous security process.

What Auditors/QSAs Might Ask (Developer Focus)

A Qualified Security Assessor (QSA) auditing for PCI DSS will probe development practices related to Requirement 6 (Secure Systems & Software):

  • (Req 6.2) "Describe your secure software development lifecycle (SSDLC) processes."
  • (Req 6.2.1) "How are custom and bespoke software developed based on industry standards and/or PCI DSS (e.g., secure coding guidelines like OWASP)?"
  • (Req 6.2.2) "How are developers trained in secure coding techniques?" (Show training records)
  • (Req 6.2.3) "How are code changes reviewed for security vulnerabilities before release?" (Describe code review process)
  • (Req 6.2.4) "How do you ensure separation of duties between development/test and production environments?"
  • (Req 6.3) "How do you identify and inventory bespoke and custom software?"
  • (Req 6.4 - v4.0) "How do you manage payment page scripts to ensure integrity and authorize scripts?" (Relevant for web devs)
  • (Req 6.5 - v3.2.1 / various in v4.0) "How do you protect against common coding vulnerabilities like injection flaws, buffer overflows, insecure cryptographic storage, XSS, etc.?" (Requires showing code examples, tool usage - SAST/DAST)
  • (Req 3) "Show how sensitive data (PAN) is protected in storage (encryption, hashing, truncation) within the application."
  • (Req 4) "Demonstrate how sensitive data is encrypted during transmission."
  • (Req 8) "How does the application enforce password complexity and MFA requirements?"

QSAs need evidence of documented processes, developer training, secure coding standards adherence, code reviews, security testing results (SAST/DAST), and secure configuration within the application.

Quick Wins for Development Teams

Developers can significantly contribute to PCI DSS compliance:

  1. NEVER Store SAD: Ensure code never logs, stores, or retains CVV2, track data, or PINs after authorization.
  2. Minimize CHD Handling: If possible, use third-party payment processors/gateways that keep CHD off your systems entirely (reducing scope). If you must handle it, minimize where it flows and is stored.
  3. Secure Coding Basics: Focus on preventing OWASP Top 10 vulnerabilities, especially injection (SQLi, command injection) and Cross-Site Scripting (XSS), through input validation and output encoding.
  4. Parameterize Database Queries: Always use prepared statements or parameterized queries to prevent SQL injection.
  5. Encrypt/Hash/Tokenize PAN: If storing PAN, use strong, standard encryption (AES-256) with proper key management, or consider tokenization solutions. Don't roll your own crypto.
  6. Use Strong TLS: Ensure all CHD transmission uses current, secure TLS versions and strong cipher suites.
  7. Implement Input Validation: Rigorously validate all input from users or external systems.
  8. Apply Security Headers: Use HTTP security headers (like Content-Security-Policy) to mitigate XSS and other client-side attacks, especially important for Req 6.4 in v4.0.

Ignore This And... (Consequences of Non-Compliance)

Ignoring PCI DSS can be financially crippling and reputationally devastating:

  • Monthly Fines: Acquiring banks levy hefty fines for non-compliance, typically ranging from $5,000 to $100,000+ per month, increasing based on compliance level and duration of non-compliance.
  • Increased Transaction Fees: Banks may increase transaction fees for non-compliant merchants.
  • Card Brand Penalties: Card brands can impose additional penalties directly.
  • Termination of Card Processing: Banks can revoke the ability to accept payment cards entirely, effectively shutting down card payment revenue streams.
  • Data Breach Costs: If non-compliance leads to a breach, costs skyrocket. This includes forensic investigations, card replacement costs ($3-5+ per card), credit monitoring for victims, legal fees, regulatory fines (e.g., GDPR if applicable), and potential lawsuits.
  • Reputational Damage: Public disclosure of non-compliance or a card data breach severely damages customer trust and brand image.
  • Increased Scrutiny: Following non-compliance or a breach, organizations face more intense scrutiny from banks and card brands.

FAQ

Who needs to be PCI DSS compliant?

Any organization that accepts, processes, stores, or transmits cardholder data from the major card brands (Visa, Mastercard, American Express, Discover, JCB). This includes merchants, service providers (like payment processors, hosting providers), and financial institutions.

What is the difference between PCI DSS v3.2.1 and v4.0?

PCI DSS v4.0 is the latest version, replacing v3.2.1 (which retires March 31, 2024, though new v4.0 requirements are best practices until March 31, 2025). Key changes in v4.0 include updated password/MFA requirements, broader applicability of security controls, new requirements targeting phishing and e-commerce skimming attacks, clearer guidance, and the introduction of a "customized approach" as an alternative way to meet requirement objectives alongside the traditional "defined approach".

What are Merchant Levels / Service Provider Levels?

These categorize organizations based on the annual volume of card transactions they process. Level 1 (highest volume) has the most stringent validation requirements (annual ROC by QSA, quarterly ASV scans). Levels 2, 3, and 4 have progressively lower volumes and typically validate via annual SAQs and quarterly ASV scans.

What is a QSA and an ASV?

A QSA (Qualified Security Assessor) is an individual certified by the PCI SSC to perform onsite PCI DSS assessments and produce Reports on Compliance (ROCs) for Level 1 merchants/service providers. An ASV (Approved Scanning Vendor) is an organization certified by the PCI SSC to conduct the required quarterly external network vulnerability scans.

What is the Cardholder Data Environment (CDE)?

The CDE comprises the people, processes, and technology that store, process, or transmit cardholder data or sensitive authentication data. Accurately defining the scope of the CDE is the critical first step in PCI DSS compliance, as the requirements apply primarily within this environment. Network segmentation can be used to reduce the scope of the CDE.

Can we store the CVV2 code?

No. Sensitive Authentication Data (SAD), which includes the 3 or 4-digit card verification code (CVV2, CVC2, CID, CAV2), full magnetic stripe data, and PINs, must never be stored after the transaction authorization is complete. Storing SAD is a major compliance violation.

Is PCI DSS compliance legally required?

While PCI DSS is an industry standard created by card brands, compliance is typically mandated contractually through agreements between merchants, acquiring banks, and the card brands. Failure to comply breaches these contracts, leading to the penalties enforced by the banks/brands. It may also overlap with legal requirements like GDPR if personal data is involved.

Jump to:
Text Link

Security done right.
Trusted by 25k+ orgs.

Start for Free
No CC required
Book a demo
Share:

www.aikido.dev/learn/software-security-tools/pci-dss

Table of contents

Chapter 1: Understanding Compliance Frameworks

What Are Compliance Frameworks and Why Do They Matter?
How Compliance Frameworks Affect DevSecOps Workflows
Common Elements Across Frameworks

Chapter 2: Major Compliance Frameworks Explained

SOC 2 Compliance
ISO 27001
ISO 27017 / 27018
NIST SP 800-53
NIST SSDF (SP 800-218)
OWASP ASVS
GDPR
NIS2 Directive
DORA
EU Cyber Resilience Act (CRA)
CMMC
PCI DSS
FedRAMP
HIPAA / HITECH
Essential Eight
Singapore CCoP (for CII)
Japan Cybersecurity Act & Related (APPI)

Chapter 3: Implementing Compliance in Development

Choosing the Right Frameworks for Your Organization
Building Compliant DevSecOps Pipelines
Training Development Teams for Compliance
Audit Preparation for Developers
Maintaining Compliance Long-Term
The End

Related blog posts

See all
See all
June 4, 2024
•
Compliance

SOC 2 certification: 5 things we learned

What we learned about SOC 2 during our audit. ISO 27001 vs. SOC 2, why Type 2 makes sense, and how SOC 2 certification is essential for US customers.

January 16, 2024
•
Compliance

NIS2: Who is affected?

Who does NIS2 apply to? Who does it affect? What are essential and important sectors and company size thresholds? Aikido's app has a NIS2 report feature.

December 5, 2023
•
Compliance

ISO 27001 certification: 8 things we learned

What we wished we'd known before starting the ISO 27001:2022 compliance process. Here are our tips for any SaaS company going for ISO 27001 certification.

Company
ProductPricingAboutCareersContactPartner with us
Resources
DocsPublic API DocsVulnerability DatabaseBlogIntegrationsGlossaryPress KitCustomer Reviews
Security
Trust CenterSecurity OverviewChange Cookie Preferences
Legal
Privacy PolicyCookie PolicyTerms of UseMaster Subscription AgreementData Processing Agreement
Use Cases
ComplianceSAST & DASTASPMVulnerability ManagementGenerate SBOMsWordPress SecuritySecure Your CodeAikido for MicrosoftAikido for AWS
Industries
For HealthTechFor MedTechFor FinTechFor SecurityTechFor LegalTechFor HRTechFor AgenciesFor EnterpriseFor PE & Group Companies
Compare
vs All Vendorsvs Snykvs Wizvs Mendvs Orca Securityvs Veracodevs GitHub Advanced Securityvs GitLab Ultimatevs Checkmarxvs Semgrepvs SonarQube
Connect
hello@aikido.dev
LinkedInX
Subscribe
Stay up to date with all updates
Not quite there yet.
👋🏻 Thank you! You’ve been subscribed.
Team Aikido
Not quite there yet.
© 2025 Aikido Security BV | BE0792914919
🇪🇺 Registered address: Coupure Rechts 88, 9000, Ghent, Belgium
🇪🇺 Office address: Gebroeders van Eyckstraat 2, 9000, Ghent, Belgium
🇺🇸 Office address: 95 Third St, 2nd Fl, San Francisco, CA 94103, US
SOC 2
Compliant
ISO 27001
Compliant