Navigating PCI DSS requirements can be both complex and daunting. If your business handles card data, you may need to comply with over 300 security controls outlined in PCI DSS. The PCI Council has published more than 1,800 pages of official documentation, including over 300 pages dedicated solely to determining the correct compliance validation forms—reading through all of this would take more than 72 hours.
To simplify the process, here is a step-by-step guide to help you validate and maintain PCI compliance.
PCI DSS is the global security standard for organizations that store, process, or transmit cardholder data and sensitive authentication data. It establishes a baseline level of protection for consumers, helping to reduce fraud and data breaches across the payment ecosystem. This standard applies to any entity that accepts or processes payment cards.
Achieving PCI DSS compliance involves three key components:
Securely Collecting and Transmitting Card Data: Ensuring that sensitive card details are handled securely during customer transactions.
Storing Data Safely: Adhering to the 12 security domains outlined in the PCI standard, which include encryption, continuous monitoring, and security testing.
Annual Validation: Confirming the implementation of required security controls through forms, questionnaires, external vulnerability scans, or third-party audits. (Refer to the step-by-step guide below for a detailed table of the four compliance levels.)
Some business models require the direct handling of sensitive credit card data during payments, while others do not. Companies that handle card data, such as accepting untokenized PANs on a payment page, may need to comply with all 300+ PCI DSS security controls. Even if card data briefly traverses a company’s servers, they must invest in and maintain robust security software and hardware.
For businesses that don’t need to handle sensitive card data, it’s best to avoid doing so. Third-party solutions, like Cutflow Elements, securely accept and store card data, eliminating much of the complexity, cost, and risk. Since card data never touches the company’s servers, compliance involves only a few straightforward security controls, such as implementing strong passwords.
Organizations that handle or store cardholder data must define the scope of their Cardholder Data Environment (CDE). PCI DSS defines the CDE as the people, processes, and technologies involved in storing, processing, or transmitting cardholder data—or any system connected to it. Since all 300+ security requirements apply to the CDE, it’s critical to segment the payment environment from the broader business systems. Proper segmentation helps reduce the scope of PCI compliance validation. Without segmentation, the entire corporate network, including all systems and devices, would fall under PCI requirements—an overwhelming task.
Regardless of how card data is handled, organizations must complete a PCI validation form annually. The method of validation depends on various factors, including:
Payment Processors: May require compliance as part of their reporting to payment card brands.
Business Partners: May request it as a condition for entering business agreements.
Platform Businesses: May need to demonstrate compliance to assure customers that data is handled securely.
The PCI DSS standard encompasses 12 primary requirements and more than 300 sub-requirements, reflecting leading security practices.
BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS
1. Install and maintain network security controls.
2. Apply secure configurations to all system components.
PROTECT ACCOUNT DATA
3. Protect stored cardholder data.
4. Protect cardholder data with strong cryptography during transmission over open, public networks.
MAINTAIN A VULNERABILITY MANAGEMENT PROGRAM
5. Protect all systems and networks from malicious software.
6. Develop and maintain secure systems and software.
IMPLEMENT STRONG ACCESS CONTROL MEASURES
7. Restrict access to system components and cardholder data by business need to know.
8. Identify users and authenticate access to system components.
9. Restrict physical access to cardholder data.
REGULARLY MONITOR AND TEST NETWORKS
10. Log and monitor all access to system components and cardholder data.
11. Test security of systems and networks regularly.
MAINTAIN AN INFORMATION SECURITY POLICY
12. Support information security with organizational policies and procedures.
To simplify the PCI compliance process for new businesses, the PCI Council introduced nine different Self-Assessment Questionnaires (SAQs), each representing a subset of the overall PCI DSS requirements. The challenge lies in determining which SAQ applies to your business or whether it’s necessary to engage a PCI Council–approved auditor to verify compliance with all security requirements. Adding to the complexity, the PCI Council updates the rules every three years and releases incremental updates throughout the year, making compliance a constantly evolving process.
The first step in achieving PCI compliance is knowing which requirements apply to your organization. There are four different PCI compliance levels, typically based on the volume of credit card transactions your business processes during a 12-month period.
Level 1
Organizations that annually process more than 6 million transactions of Visa or Mastercard, or more than 2.5 million for American Express; or
Have experienced a data breach; or
Are deemed “Level 1” by any card association (Visa, Mastercard, etc.)
Annual PCI DSS Self-Assessment Questionnaire (SAQ)—there are 9 SAQ types shown briefly in the table below
Quarterly network scan by Approved Scan Vendor (ASV)
Attestation of Compliance (AOC)—each of the 9 SAQs has a respective AOC form
Level 2
Organizations that process between 1–6 million transactions annually
Annual Report on Compliance (ROC) by a Qualified Security Assessor (QSA)—also commonly known as a Level 1 onsite assessment—or internal auditor if signed by an officer of the company
Quarterly network scan by Approved Scan Vendor (ASV)
Attestation of Compliance (AOC) for Onsite Assessments–there are specific forms for merchants and service providers
Level 3
Organizations that process between 20,000–1 million online transactions annually
Organizations that process fewer than 1 million total transactions annually
Same as above.
Level 4
Organizations that process fewer than 20,000 online transactions annually; or
Organizations that process up to 1 million total transactions annually
Same as above.
For Level 2–4, there are different SAQ types depending on your payment integration method. Here’s a brief table:
Not applicable to face-to-face channels. Not applicable to service providers.
Applicable only to ecommerce channels. Not applicable to service providers.
Imprint machines with no electronic account data storage, and/or
Standalone, dial-out terminals with no electronic account data storage
Not applicable to ecommerce channels. Not applicable to service providers.
Not applicable to ecommerce channels.
Not applicable to ecommerce channels. Not applicable to service providers.
Not applicable to service providers.
Not applicable to ecommerce channels. Not applicable to service providers.
Not applicable to unattended card-present, mail-order/telephone order (MOTO), or ecommerce channels. Not applicable to service providers.
SAQ D FOR SERVICE PROVIDERS: All service providers defined by a payment brand as eligible to complete an SAQ.
After mapping all touchpoints for credit card data within your organization, collaborate with your IT and security teams to confirm that appropriate security configurations and protocols are in place. This includes measures like Transport Layer Security (TLS) to safeguard data transmission.
The 12 PCI DSS security requirements are built on leading practices for protecting sensitive data and often overlap with standards required for compliance with other privacy regulations such as GDPR and HIPAA. As a result, your organization may already have some of these controls in place.
PCI compliance is not a one-time task but an ongoing process to ensure your business stays compliant as data flows and customer touchpoints evolve. Some credit card brands may require quarterly or annual reports, or an annual on-site assessment, especially for businesses processing over 6 million transactions per year.
Maintaining PCI compliance year-round often requires collaboration across multiple departments. If such coordination isn’t already in place, consider forming a dedicated internal team to oversee compliance. A well-rounded “PCI team” should include representatives from key areas of the business, ensuring comprehensive coverage of compliance needs.
Security: The Chief Security Officer (CSO), Chief Information Security Officer (CISO), and their teams ensure the organization is always properly investing in the necessary data security and privacy resources and policies.
Technology/Payments: The Chief Technology Officer (CTO), VP of Payments, and their teams make sure that core tools, integrations, and infrastructure remain compliant as the organization’s systems evolve.
Finance: The Chief Financial Officer (CFO) and their team ensure that all payment data flows are accounted for when it comes to payment systems and partners.
Legal: This team can help navigate the many legal nuances of PCI DSS compliance.
For more information about the complex world of PCI compliance, head to the PCI Security Standards Council website. If you only read this guide and a few other PCI docs, we recommend starting with these: prioritized approach for PCI DSS, SAQ instructions and guidelines, FAQ about using SAQ eligibility criteria to determine onsite assessment requirements, and FAQ about obligations for merchants that develop apps for consumer devices that accept payment card data.
Cutflow significantly simplifies the PCI burden for companies that use Cutflow In App payments and Secure payment Forms. Cutflow uses a hosted payment field for handling all payment card data, so the cardholder enters all sensitive payment information in a payment field that originates directly from our PCI DSS–validated servers.
For all our users, regardless of integration type, Cutflow acts as a PCI advocate and can help in a few different ways.
We’ll analyze your integration method and advise you on how to reduce your compliance burden.
We’ll notify you ahead of time if a growing transaction volume will require a change in how you validate compliance.
For large merchants (Level 1), if you need to work with a PCI QSA (because you store credit card data or have a more complex payment flow), there are more than 350 such QSA companies around the world, and we can connect you with several auditors that deeply understand the different Cutflow integration methods.
While assessing and validating PCI compliance typically occurs annually, it’s not a one-time effort—it requires continuous assessment and remediation. As your company grows, its business logic and processes will evolve, potentially impacting compliance requirements. For instance, an online business opening physical stores, entering new markets, or launching a customer support center should proactively assess whether these changes affect its PCI validation method and revalidate compliance as needed.
PCI Compliance Helps, But It’s Not Enough
Adhering to PCI DSS guidelines is essential for safeguarding cardholder data, but it alone doesn’t provide complete protection for all payment environments. A more effective approach involves adopting secure card acceptance methods, such as Cutflow In App payments and Secure Payment Forms. These solutions offer a proactive way to mitigate data breaches and bypass the traditional, labor-intensive PCI validation process. Beyond compliance, they provide consistent, reliable security every day of the year, empowering businesses to operate with confidence and agility.