Guide

PCI DSS Compliance

Why It Matters and How to Obtain It

PCI DSS Badge

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security controls  designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment. PCI DSS was created by the PCI Security Standards Council, an independent body founded by major payment card brands including Visa, MasterCard, American Express, Discover, and JCB International. 

This guide covers all key aspects of PCI DSS compliance and answers common questions from organizations new to the PCI DSS compliance process. Much of the information in this guide is sourced from the PCI Security Standards Council, the creator of the PCI Data Security Standards and the definitive authority on this subject. Once you have read this guide, we recommend heading over to the PCI Security Standard Council Website to continue your learning process.

What is PCI DSS?

Payment terminal illustration

Whenever a business accepts, processes, or transmits payment data (e.g., credit or debit cards), it opens itself up to the risk that such data will be stolen. Hackers and cyber criminals want your customers’ credit card data. By obtaining the Primary Account Number (PAN) and sensitive authentication data, a thief can impersonate the cardholder, use the card, and steal the cardholder’s identity. 

Data breaches compromising sensitive cardholder data are incredibly common. In 2018 alone, $24.26 billion was lost due to payment card fraud worldwide, and the United States took the lead as the most credit fraud-prone country, with 38.6% of reported card fraud losses. Meanwhile, identity theft was the third largest cause of fraud in the US. in 2018. 

When businesses don’t take precautions to secure their systems and network, they’re likely to be targeted. Sensitive cardholder data can be stolen from many places, including compromised card readers, paper stored in a filing cabinet, data in a payment system database, hidden cameras recording entry of authentication data, or a secret tap into your store’s wireless or wired network.  

In 2006, major payment brands American Express, Discover, JCB International, MasterCard, and Visa Inc. came together to address the vital need to have a secure payment ecosystem. These companies formed the Payment Card Industry Security Standards Council with the mission of helping all merchants, service providers, and software developers and manufacturers of payment applications and devices understand and implement a set of security standards designed to ensure adequate protection of cardholder data. 

To fulfill this mission, The Council created the PCI Data Security Standards (PCI – DSS) — a set of technical and operational requirements for organizations accepting or processing payment transactions, and for software developers and manufacturers of applications and devices used in those transactions. By following these standards, organizations can keep their defenses up and minimize the chances of suffering from costly attacks aimed at stealing cardholder data.

Person with PCI DSS badge

Does your business need to be PCI DSS compliant?

Maintaining payment security is required for all entities that store, process, or transmit cardholder data. In fact, the security benefits of maintaining PCI DSS compliance are essential to the long-term success of organizations that accept, process or transmit cardholder data. Being PCI DSS compliant helps your organization maintain trust with customers who use their cards to purchase your products and services. 

Last but not least, the consequences of not protecting cardholder data are severe. The liabilities your organization may face when you experience a security breach that results in payment card data being compromised include: 

  • Lost confidence from customers 
  • Diminished sales due to reputational damage 
  • Fees from having to issue new credit cards  
  • Compensation costs of PCI non-compliance, including compensating your clients with credit card monitoring and/or identity theft insurance 
  • Legal costs, settlements, and judgments. Lawsuits are a possible outcome if the variation of multiple card holders has been endangered  
  • Fines and penalties instituted by credit card companies, ranging from $5,000 to $100,000 per month. These penalties depend on the volume of transactions, the level of PCI DSS that the company is designated to, and the time that it has been non-compliant  
  • Termination of ability to accept payment cards (enforced by your acquiring bank or payment brands) 
  • Federal audits: If your company has a large volume of clients, the Federal Trade Commission can choose to perform audits to make sure you’re compliant with the security standard. The Federal Trade Commission monitors organizations that don’t comply with PCI DSS, and apart from imposing its strict regulations, it can decide to penalize your company for non-compliance as well. 
  • Lost jobs (e.g., CISO, CIO, CEO and dependent professional positions) 
  • Going out of business
Payment Terminal Decorative

What are the common PCI DSS control failures?

The founding members of the PCI Security Standards Council continually monitor occurrences of account data compromise. Forensic analysis of compromises has shown that common security weaknesses, which are addressed by PCI DSS controls, are often exploited because PCI DSS controls either were not in place or were poorly implemented when the compromises occurred. 

Generally speaking, understanding the PCI requirements for the specific environment that addresses controls is the first step. There are 4 levels. At a minimum, you must select and complete the applicable self-assessment questionnaire (SAQ). You can summarize common control failures into several buckets: network configurations, network segmentation, data encryption, basic system configurations, physical security, and policies and procedures. Be sure to maintain PCI compliance at all times, not just before an assessment is scheduled.

Examples of common PCI DSS control failures include: 

  • Improper scoping: The scope is the cardholder data environment (CDE and includes all of the systems, people, processes and technologies that handle cardholder data. It is important to note that systems that support and secure the (CDE) must also be included in the scope of PCI DSS. Examples of in-scope systems include antivirus, patch management and vulnerability scanning. Organizations often try to reduce the scope of their PCI DSS compliance effort by using network segmentation, or sectioning off one network into smaller segments, in such a way that limits or prevents communication between them. However, when network segmentation is done improperly, hackers may be able to enter from a less secure area (such as an office zone) into a merchant’s cardholder data environment.
  • Storage of sensitive authentication data (SAD), such as track data, after authorization. Many compromised entities were unaware that their systems were storing this data. It is important to note per PCI you are
    only allowed to use SAD strictly to process the payment and you should not store the data after completing the authorization process.
  • Inadequate access controls due to improperly installed point-of-sale (POS) systems, allowing bad actors in via paths intended for POS vendors. 
  • Default system settings and passwords not changed when the system was installed. 
  • Poorly coded web applications resulting in SQL injection and other vulnerabilities, which allow access to the database storing cardholder data directly from the website.
  • Missing and outdated security patches. 
  • Lack of logging. Audit trails for each of the following processes must be established and have
    sufficient storage to house the transaction logs:
  • Individual users with card holder data
  • All actions performed by users with administrative privileges
  • All invalid access attempts
  • Tracking of audit log clearings
  • Secure assessment trail logs and access restriction to those with job-related needs
  • Lack of monitoring (via log reviews, intrusion detection/prevention, quarterly vulnerability scans, and change-detection mechanisms).
  • Encryption key management. The biggest challenge is the effective utilization of encryption and
    tokenization tools. There are five fundamentals of key management should be adhered to in order to present weaknesses in the process. The standard includes 1) key storage, 2) key policy management, 3) key authentication, 4) key authorization, and 5) key authorization.
  • Not addressing PCI DSS compliance in your quarterly or semiannual security check assessment. A process should be incorporated to flag exceptions that occur in the course of daily operations and investigate the exception.

When should you consider PCI DSS compliance?

Calendar illustration

Given the severe consequences of non-compliance, you shouldn’t take any risks by handling payments before receiving official validation of compliance. In other words, you need to become PCI-DSS compliant before accepting any card data from clients and customers.

Use Hyperproof to manage your PCI DSS compliance effort

Hyperproof can help you hit the ground running with your PCI DSS compliance effort and easily maintain compliance over time.

Sign up for a personalized demo to see how Hyperproof works

What are the requirements specified in PCI DSS?

If you accept or process payment cards, the following standards apply to you.

PCI DSS requirements - a breakdown of standards that apply to businesses that accept or process payment cards
GoalsPCI DSS requirements
Build and maintain a secure network 1. Install and maintain a firewall configuration to protect cardholder data2. Do not use vendor-supplied defaults for system passwords and other security parameters 
Protect cardholder data 3. Protect stored cardholder data 4. Encrypt transmission of cardholder data across open, public networks 
Maintain a vulnerability management system 5. Use and regularly update anti-virus software or programs 6. Develop and maintain security systems and applications 
Implement strong access control measures 7. Restrict access to cardholder data to a need-to-know basis 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data 
Regularly monitor and test networks10. Track and monitor all access to network resources and cardholder data11. Regularly test security systems and processes

What is the process for becoming PCI DSS compliant?

The PCI DSS compliance journey involves three steps: 

1. Assess

Identify cardholder data and take an inventory of information technology assets and business processes for payment card processing. Analyze the IT assets and business processes for vulnerabilities. 

2. Remediate

Fix vulnerabilities and eliminate the storage of cardholder data unless keeping it is absolutely essential.

3. Report

Validation of compliance with PCI DSS is determined by the individual payment brands and acquiring banks. All of these organizations have agreed to incorporate the PCI Data Security Standard as part of the technical requirements for each of their data security compliance programs. The payment brands also recognize Qualified Security Assessors and Approved Scanning Vendors qualified by the PCI Security Standards Council.

Check with your acquiring bank and the brands you accept payment from to see what you need to do to demonstrate compliance. You’ll be expected to submit reports to the appropriate acquiring bank and payment card brands.

What is a qualified security assessor?

Woman with a checkmark badge decorative

A qualified security assessor is a data security firm that is approved by the PCI Council to perform on-site PCI Data Security Standard Assessments. The Assessor will: 

  • Verify all technical information given by merchant or service provider 
  • Use independent judgment to confirm the standard has been met 
  • Provide support and guidance during the compliance process
  • Be onsite for the duration of the assessment as required 
  • Adhere to the PCI Data Security Assessment Procedures
  • Validate the scope of the assessment 
  • Evaluate the compensating controls 
  • Produce the final Report 

You can visit the PCI Security Standards Council for a list of all Qualified Security Assessors.

Payment terminal illustration

What is an approved scanning vendor?

An approved scanning vendor is a data security firm that uses a scanning solution to determine whether or not the customer meets the external vulnerability scanning requirement. Approved Scanning Vendors are qualified by the PCI Security Standards Council to perform external network and system scans as required by the PCI Data Security Standard.

You can visit the PCI Security Standards Council for a list of all Approved Scanning Vendors.

What are the compliance validation levels for PCI DSS?

Compliance Validation Levels

What you must do to become compliant will depend on your designated compliance level, which is determined by the individual payment brands.   

Speaking generally, merchants and service providers with low transaction volumes (e.g., under 50,000 card transactions per year) will be designated to a lower validation level. Such organizations will need to complete annual self-assessments, have those self-assessments certified by Senior Management, schedule quarterly network scans conducted by approved scanning vendors, and submit all reports to their acquiring bank. 

Merchants with high volumes of transactions (e.g., over 2.5 million card transactions per year) will be designated to a higher validation level. Such organizations will be required to go through annual on-site security examinations by a Qualified Security Assessor (QSA) and submit reports of quarterly network scans conducted by an approved scanning vendor. 

For an example of how payment brands designate validation levels and the requirements for each level, check out the reporting requirements for merchants and service providers from American Express below.

Source: American Express 

Levels Level definitionRequirements
Level EMV50,000 or more American Express Chip-enabled Card transactions per year with at least 75% made on an EMV-enabled (Chip-enabled) terminal capable of processing contact and contactless American Express transactionsAnnual EMV attestation (required). This is a self examination of the PCI compliance status for equipment, systems, networks and their components where cardholder data or sensitive authorization data (or both) are stored, processed or transmitted. 
You must complete the AEA and have it certified by your CEO, CFO, CIO or principal. Results must be submitted to Amex annually. 
Level 3 <50,000 American Express card transactions per year (merchants only, not applicable to service providers) Annual self assessment questionnaire recommended. This is a self-examination of the equipment, systems, networks and components where Card Member information is stored, processed, or transmitted using the PCI Security Standards Self-Assessment Questionnaire (“SAQ”).
You may complete the questionnaire and have it certified by your CEO, CFO, CIO or principal. Results may be submitted to us annually.
Quarterly network scan (recommended) This is a remote test of your Internet-connected computer networks and web servers for potential vulnerabilities.An Approved Scanning Vendor (ASV) must perform the exam. Then you must complete and submit the ASV’s Attestation of Scan Compliance (“AOSC”) or the executive summary of findings of the scan to us every 90 days.
Level 3 Designated Less than 50,000 American Express Card Transactions per year and has been designated by American Express as being required to submit validation documents. (merchants only; does not apply to service providers).American Express will contact these designated merchants and provide them details for reporting their security status by submitting PCI validation documents.Annual Self Assessment Questionnaire (required)This is a self-examination of the equipment, systems, networks and components where Card Member information is stored, processed, or transmitted using the PCI Data Security Standards Self-Assessment Questionnaire (“SAQ”).You must complete the questionnaire and have it certified by your chief executive officer, chief financial officer, chief information security officer or principal. Results must be submitted to us annually.
Quarterly Network Scan (required)This is a remote test of your Internet-connected computer networks and web servers for potential vulnerabilities.An Approved Scanning Vendor (ASV) must perform the exam. Then you must complete and submit the ASV’s Attestation of Scan Compliance (“AOSC”) or the executive summary of findings of the scan to us every 90 days.
Level 2 50,000 to 2.5 million American Express Card transactions per year (Service providers: less than 2.5 million transactions)Annual Self Assessment Questionnaire (required)This is a self-examination of the equipment, systems, networks and components where Card Member information is stored, processed, or transmitted using the PCI Data Security Standards Self-Assessment Questionnaire (“SAQ”).You must complete the questionnaire and have it certified by your chief executive officer, chief financial officer, chief information security officer or principal. Results must be submitted to us annually.
Quarterly Network Scan (required)This is a remote test of your Internet-connected computer networks and web servers for potential vulnerabilities.An Approved Scanning Vendor (ASV) must perform the exam. Then you must complete and submit the ASV’s Attestation of Scan Compliance (“AOSC”) or the executive summary of findings of the scan to us every 90 days.
Level 12.5 million or more American Express Card transactions per year (or if you’ve been selected a Level 1 by American Express)Annual On-site Security Assessment Report (required)This is a detailed on-site examination of the equipment, systems, networks and components where Card Member information is stored, processed, or transmitted.Either a Qualified Security Assessor (QSA) performs the exam, or you perform the exam and have the results certified by your chief executive officer, chief financial officer, chief information security officer or principal. Results must be submitted to us annually.
Quarterly Network Scan (required)This is a remote test of your Internet-connected computer networks and web servers for potential vulnerabilities.An Approved Scanning Vendor (ASV) must perform the exam. Then you must complete and submit the ASV’s Attestation of Scan Compliance (“AOSC”) or the executive summary of findings of the scan to us every 90 days.
PCI DSS Levels
PCI DSS Levels
PCI DSS Levels

For specific questions about compliance validation levels and what you need to do to receive validation, you’ll need to contact your acquiring financial institution or payment card brand. 

Once you know what compliance level to aim for, you’ll need to submit the validation requirements to your acquiring bank, which will then report your compliance status to the payment card brand.

Where are PCI DSS controls required and which systems need to be protected?

Woman on computer completing tasks - decorative

Implementing PCI DSS starts with scoping, a process that involves identifying all system components that are located within or connected to the cardholder data environment (CDE). 

Your CDE is made of people, processes, and technology that interact with cardholder data or sensitive authentication data. To determine what’s in-scope, you’ll need to look at internal systems and networks as well as all connections from third-party vendors (e.g., business partners, firms providing remote support services).  All systems that interface with the PCI processing or computing environment should be protected.

The current PCI DSS standard is 4.0.1. The controls required will depend on the PCI environment (I.e. level, SAQ), including the SAQ to complete. Some environments require a third party QSA to complete an assessment. The PCI Data Security Council maintains documents here.

You must identify all locations and flows of cardholder data to ensure all applicable system components are included as in-scope for the PCI Data Security Standard assessment. Scoping should be done annually and must occur prior to the annual assessment. 

The controls that should be implemented for PCI DSS environments are outlined below:

  • Identity Management, Authentication and Access Control: Access to physical and logical assets and associated facilities is limited to authorized users, processes, and devices, and is managed in a way consistent with the assessed risk of unauthorized access to authorized activities and transactions.
  • Anomalies and Events: Anomalous activity is detected in a timely manner and the potential impact of events is understood.
  • Detection Processes: Detection processes and procedures are maintained and tested to ensure awareness of anomalous events.
  • Response Planning: Response processes and procedures are executed and maintained, to ensure response to detected cybersecurity incidents.
  • Communications: Response activities are coordinated with internal and external stakeholders (e.g. external support from law enforcement agencies).
  • Analysis: Analysis is conducted to ensure effective response and support recovery activities.
  • Mitigation: Activities are performed to prevent escalation of an event, mitigate its effects, and resolve the incident.
  • Improvements: Organizational response activities are improved by incorporating lessons learned from current and previous detection/response activities.
  • Recovery Planning: Recovery processes and procedures are executed and maintained to ensure timely restoration of systems or assets affected by cybersecurity incidents.
  • Improvements: Recovery planning and processes are improved by incorporating lessons learned into future activities.
  • Communications: Restoration activities are coordinated with internal and external parties (e.g. coordinating centers, Internet Service Providers, owners of attacking systems, victims, other CSIRTs, and vendors).
Decorative - Globe Icon

To visualize your systems and how they interact with your cardholder data, developing a network diagram is a helpful step (and your PCI DSS assessor will need to see it at the time of the assessment). For details on how to develop a network diagram, check out this article

The general guidance provided by the PCI Security Standards Council is to start with the assumption that everything is in scope until verified otherwise. 

The PCI DSS points out that the CDE is really just the starting point when accurately determining your PCI scope. They strongly recommend organizations evaluate not only the CDE, but also the flow of cardholder data in and out of the CDE, reminding them that: 

  • Systems located within the CDE are in scope irrespective of their functionality or the reason they’re in the CDE. 
  • Systems that connect to a system in the CDE are in scope irrespective of their functionality or the reason they are connected to the CDE. 
  • In a flat network, all systems are in scope if any single system stores, processes, or transmits account data. 
PCI DSS Scoping Categories

Ways to reduce the scope of PCI DSS

Decorative - Folder illustration

There are a few ways for you to reduce the scope and subsequently reduce your compliance costs, operations costs, and the risk associated with interacting with payment card data. 

Don’t store cardholder data 

The best step you can take to protect cardholder data and reduce the PCI scope is to not store any cardholder data you do not need. For instance, if you do not store the primary account number (PAN), the PCI DSS does not apply to that area of your organization and the scope of the assessment can be reduced. 

Segmentation

One common way to reduce the number of in-scope systems within the CDE is to apply segmentation. According to PCI DSS, “To be considered out of scope for PCI DSS, a system component must be properly isolated (segmented) from the cardholder data environment (CDE), such that even if the out-of-scope system component was compromised it could not impact the security of the CDE.” 

Segmentation involves using additional controls to separate systems with different security needs. Segmentation can consist of logical controls, physical controls, or a combination of both. These controls would keep your payment card processing systems from interacting with your back office systems. 

Common segmentation methods for reducing PCI DSS scope include:

  • Firewalls and router configurations to prevent traffic passing between out-of-scope networks and the CDE
  • Network configurations that prevent communications between different systems and/or subnets 
  • Physical access controls 
PCI Network Segmentation

Depending on the complexity of your environment, segmenting your network can be challenging. Here’s a quick overview of a logical process for segmenting your network. You may need to reach out to a QSA to assist you in this work. 

Tokenization

Tokenization is the process of removing sensitive data such as payment card information from your business systems by replacing it with an indecipherable token (a string of numbers) and storing the original data in a secure cloud data vault. Tokenized data does not count as cardholder data. Once cardholder data is tokenized, it can flow through your environment without bringing any of those devices that store, process, or transmit the token into scope for PCI compliance requirements.

Essentially, the tokenization process allows you to outsource the handling and storage of sensitive data to a secure third party. You would need to use a tokenization platform to implement the technique. 

Tokenization Process

Outsourcing 

Credit Card Interface

Using a qualified vendor that is PCI compliant can reduce your PCI exposure. For instance, you could only take payment card information through an eCommerce application hosted by a third-party PCI iFrame. You could also have a hosted contact center/customer support solution so payment card data flows through both the eCommerce and contact center environments without touching your own operational environment. 

To implement this tactic, you will need to find outsourcing vendors that have validated solutions and can demonstrate that their security posture is up to the standards specified by the PCI Security Standards Council.  

In addition to implementing these tactics, you can try to contact QSAs for additional ideas on how to reduce PCI scope.  

Caveats for reducing scope of PCI DSS 

The PCI Security Standards Council points out that reducing the number of in-scope systems for PCI DSS compliance does not reduce your need for security measures. A system that is not in scope for PCI DSS may still need certain protections, as it could still pose a risk to an organization’s network and business. 

Based on forensic analysis conducted by the Council, a common pattern in data breaches is for an attacker to target systems deemed by a business to be out-of-scope for PCI DSS, then use those systems to gain access to more systems, which eventually provide a path to systems where cardholder data (CHD) can be found. Thus, implementing scope-reduction tactics should not replace a holistic approach to securing your infrastructure. 

Determining the scope of PCI DSS compliance is a complicated topic. For further guidance, we recommend reading the Information Supplement Guidance for PCI DSS Scoping and Network Segmentation provided by the PCI Security Standards Council or consulting with a qualified professional services firm.

General tips and strategies for implementing PCI DSS

Below are some general tips for starting your PCI DSS compliance effort. These tips are designed to help you limit risks, limit the scope of your compliance effort, and keep costs contained. 

1. Limit the cardholder data you store

Icon One and Zeroes

The best step you can take to protect cardholder data is to not store any cardholder data you do not need, and to isolate the data you do need to well-defined and controlled central locations. 

Payment brand rules allow for storage of primary account number (PAN), expiration date, cardholder name, and service data. However, if you don’t have a legitimate business purpose for storing the data, consider getting rid of it. 

Additionally, you should weigh the business benefits of storing such data against the risks and burdens associated with storage, including the risk of having the data compromised, the additional PCI DSS controls that must be applied to protect that data, and the ongoing maintenance efforts to remain PCI DSS compliant over time. 

2. Never store sensitive authentication data after authorization 

Sensitive authentication data includes the full track contents of the magnetic stripe or equivalent data on a chip, card verification codes and values, PINs, and PIN blocks. This data should NEVER be stored after authorization. 

3. Ask your POS vendor about the security of your system 

Decorative - Purple security badge

If your business uses POS in retail locations, you need to ensure that your POS vendor has sufficient security measures. In general, it’s useful to ask these vendors how they are mitigating the common control failures we outlined earlier. For instance, ask them whether default settings and passwords have been changed on systems and databases that are part of your POS system. Ask them whether your POS software is storing sensitive authentication data, such as track data or PIN blocks (this is prohibited), and if “yes,” how quickly they can delete this data. 

For a detailed list of questions to ask of your POS vendor, refer to page 5 of SAQ Guidelines and Instructions from the Council’s website. 

4. Isolate cardholder data you do need and consolidate it

Decorative - Green Lock

You can limit the scope of a PCI DSS assessment by consolidating data storage in a defined environment and isolating the data through the use of proper network segmentation. For instance, by making sure that the cardholder data is stored on its own network segment, rather than the same network segment your employees use to receive emails and browse the internet, you can put PCI DSS controls on a portion of your network instead of the entire network.  

5. Compensating controls 

Decorative - Balancing

If your organization does not have the exact control specified by the PCI DSS but has other controls in place that meet the PCI DSS definition of compensating controls,  your organization can use such controls instead. However, they need to be documented appropriately.  

6. Contact a qualified security assessor for professional assistance and training 

Person Badge

If you’re new to the PCI DSS compliance process, we strongly encourage you to engage a security professional for help. Consider contacting a Qualified Security Assessor (QSA). QSAs have been trained by PCI SSC to conduct PCI DSS assessments and can be found here.

7. Maintain PCI DSS controls over time 

Checkmark

It’s not enough to set up the security controls just to pass a one-time assessment. To effectively secure these systems and payment data, your organization should continuously monitor and enforce the use of controls specified in the PCI Data Security Standard (more on this below). 

Lightbulb Decorative

8. Additional tips for tackling common security concerns from the PCI Security Standards Council 

  • Buy and use only approved PIN entry devices at your points-of-sale.
  • Buy and use only validated payment software at your POS or website shopping cart.
  • Use a firewall on your network and PCs.
  • Make sure your wireless router is password-protected and uses encryption.
  • Use strong passwords. Be sure to change default passwords on hardware and software – most are unsafe.
  • Regularly check PIN entry devices and PCs to make sure no one has installed rogue software or “skimming” devices.
  • Teach your employees about security and protecting cardholder data.
  • Ensure management understanding of the PCI environment where cardholder data is being processed and the specific PCI control requirements to maintain PCI compliance.
  • Changes to the environment will also need to be monitored to ensure ongoing compliance. A quick reference for PCI 4.0.1 can be found here.

PCI DSS Compliance Checklist

Basic PCI Compliance tips
  • Perform scans as early as possible.
  • Encrypt stored cardholder data.
  • Use network segmentation.
  • Maintain the security of cardholder data while in transit.
  • Prepare adequately for QSA (Qualified Security Assessors) assessments.
  • Reduce the PCI scope of your environment.
  • Pick payment providers that maintain the highest PCI compliance standards.
  • Take care of your system and network vulnerabilities.
  • Only do business with companies that are also PCI DSS compliant.
  • Create a workflow map of credit card transactions.
Tips for maintaining PCI compliance
  • Institute an effective compliance program.
  • Create a dedicated team to ensure ongoing PCI compliance.
Tips for implementing PCI compliance security controls
  • Always document security controls.
  • Watch out for vulnerable code.
  • Establish long-term processes for securing cardholder information.
  • Encrypt cardholder data wherever they reside.
  • Focus on achieving security, not just compliance.
Employee training tips for PCI
  • Organize security awareness training for employees.
  • Ensure that employees go through regular cybersecurity training.
Tips for creating PCI compliance policies and procedures
  • Create PCI-specific policies.
  • Map data flows.
  • Ensure that you have robust risk mitigation processes in place.
  • Implement strong access control features.
  • Develop an incident response plan.

How does PCI-DSS fit into your overall compliance program?

Although PCI DSS covers a very specific type of information, the controls and safeguards required to protect payment are similar to those required in other cybersecurity frameworks. If you already have a robust information security program, you may already be meeting certain PCI DSS requirements and the additional work may be insignificant. 

Inversely, if you are already PCI DSS compliant and are looking to achieve compliance with other data protection standards, such as SOC 2, ISO27K, or CCPA, your PCI data security standards will likely give you a headstart. Access control, maintaining a vulnerability management system, and employee training are just a few examples of PCI DSS compliance requirements that overlap with requirements in other cybersecurity frameworks.

Using Hyperproof to become (and stay) PCI-DSS compliant

If you need to ensure compliance with PCI DSS requirements and stay on top of your security controls on a continuous basis, Hyperproof’s compliance operations software can make that work simpler and faster.  

Hyperproof allows you to easily see the requirements and controls for PCI DSS (as well as those for other common cybersecurity standards, such as SOC 2 and ISO 27001), tailor each control to your business, collect evidence of controls’ operating effectiveness, and automate repetitive administrative tasks associated with the compliance efforts. 

PCI DSS Controls Screen

Hyperproof’s control crosswalking feature allows you to easily leverage your existing security controls to meet PCI DSS requirements.  Hyperproof has done the hard work of mapping out the relationships between various cybersecurity frameworks, so we know which requirements and controls are common across frameworks and/or standards.  

PCI DSS Badge

If you already have a robust security program that’s managed in Hyperproof (e.g., you’ve implemented SOC 2®controls), Hyperproof can tell you which of your existing controls can be applied to satisfy PCI DSS requirements to help you avoid creating duplicate controls. 

Conversely, if you’ve implemented all PCI DSS controls in Hyperproof and you’re considering becoming compliant with another infosec framework, for example, ISO 27001, Hyperproof can tell you which PCI DSS controls are similar to those required by ISO 27001 so you can become ISO 27001 compliant in a shorter amount of time. 

Beyond features that help you implement PCI DSS, Hyperproof is also built to help you maintain compliance and security over time. Hyperproof provides analytics and dashboards to help security and compliance leaders monitor their controls over time. 

Hyperproof makes it easy to see whether someone has dropped the ball on a control and re-assign control ownership as needed. For instance, with Hyperproof you can specify that John, an IT Security Analyst, needs to coordinate with an Approved Scanning Vendor to conduct a scan of your network on a quarterly basis and penetration testing once a quarter. 

Then, through Hyperproof’s dashboards, you can easily see if evidence has been provided that demonstrates the network scan has been performed. A compliance manager can also easily re-assign this task to someone else if John — the original control performer — has left your organization or is out of the office. If you’re interested in learning more about how to use Hyperproof to get started with PCI DSS,  we’d love to talk.

Related Resources

Download the PDF

G2 Crowd Leader
G2 Crowd Best Estimated ROI
G2 Crowd Best Customer Support Enterprise
G2 Crowd Fastest Implementation
G2 Crowd Momentum Leader