PCI Compliance Checklist: All 12 Requirements Explained

·

A complete PCI compliance checklist covering all 12 PCI DSS requirements, v4.0 changes that became mandatory in March 2025, and how tokenization and outsourcing can reduce your compliance scope by 93%.

Only 14% of organizations maintain full PCI DSS compliance at any given time, according to the Verizon 2024 Payment Security Report. The other 86% operate with compliance gaps that expose them to escalating fines, breach liability, and potential loss of card processing privileges.

This PCI compliance checklist breaks down all 12 PCI DSS requirements, explains the v4.0 changes that became mandatory in March 2025, and covers the scope reduction strategies that can cut your compliance burden from 328 controls to 24.

What is PCI DSS and who must comply?

PCI DSS (Payment Card Industry Data Security Standard) is the security framework governing any organization that stores, processes, or transmits cardholder data. The standard is maintained by the PCI Security Standards Council and enforced by the card networks: Visa, Mastercard, American Express, Discover, and JCB.

Compliance is not optional. Any merchant accepting card payments, any service provider handling card data on behalf of merchants, and any entity whose systems touch cardholder data must comply. The specific compliance requirements depend on transaction volume:

Level Transaction volume Validation requirement
Level 1 6+ million transactions/year External QSA audit, Report on Compliance (ROC)
Level 2 1-6 million transactions/year SAQ, some may require QSA audit
Level 3 20,000-1 million e-commerce transactions/year SAQ
Level 4 Under 20,000 e-commerce transactions/year SAQ

The Cardholder Data Environment (CDE) defines which systems fall within PCI scope. Any system that stores, processes, or transmits cardholder data, plus any system connected to those systems, is in scope. This is where scope reduction through tokenization and outsourcing becomes relevant: remove systems from the CDE, and they exit your compliance boundary.

The 12 PCI DSS requirements explained

PCI DSS v4.0 contains over 500 specific requirements organized under 12 principal requirements. Each requirement addresses a distinct security domain.

Req. Domain Core obligation
1 Network security controls Firewalls, segmentation, traffic rules
2 Secure configurations Remove vendor defaults, document standards
3 Protect stored data Tokenize/encrypt PANs, never store SAD
4 Encrypt transmission TLS 1.2+ for data in transit
5 Anti-malware Deploy and maintain on all affected systems
6 Secure development Secure SDLC, payment page script controls
7 Access control Need-to-know basis, role-based access
8 User authentication Unique IDs, MFA for CDE access, 12-char passwords
9 Physical access Badges, visitor logs, video monitoring
10 Logging and monitoring Track all access, daily log review
11 Security testing Quarterly scans, annual pen tests, page monitoring
12 Policies and programs Security policy, training, incident response

Each requirement maps to a security domain. Requirements 3, 6, and 11 changed most significantly in v4.0.


Requirement 1: Install and maintain network security controls

Network security controls (firewalls, security groups, network segmentation) must restrict traffic between trusted and untrusted networks. Cardholder data environments require explicit inbound and outbound rules, with all allowed traffic documented and justified. Segmentation that isolates the CDE from other networks reduces scope.

Requirement 2: Apply secure configurations to all system components

Vendor-supplied defaults for passwords, configurations, and unnecessary services must be changed or disabled before deployment. This applies to all system components: servers, network devices, applications, databases, and security systems. Configuration standards must be documented and maintained.

Requirement 3: Protect stored account data

Cardholder data storage must be minimized. When storage is necessary, primary account numbers (PANs) must be rendered unreadable through tokenization, truncation, hashing, or encryption. Sensitive authentication data (full track data, CVV/CVC, PINs) must never be stored after authorization.

Requirement 4: Protect cardholder data with strong cryptography during transmission

Cardholder data transmitted across open, public networks must be encrypted using strong cryptography. This includes transmission over the internet, wireless networks, and cellular technologies. TLS 1.2 or higher is required; SSL and early TLS versions are prohibited.

Requirement 5: Protect all systems and networks from malicious software

Anti-malware solutions must be deployed on all systems commonly affected by malware. This includes Windows systems, workstations, and increasingly Linux servers. Solutions must be kept current, perform periodic scans, and generate audit logs.

Requirement 6: Develop and maintain secure systems and software

Secure development practices must be followed for all software developed internally or by third parties. This includes secure coding guidelines, code reviews, vulnerability identification during development, and protection of payment page scripts. Requirement 6.4.3 (discussed below) adds specific controls for client-side scripts on payment pages.

Requirement 7: Restrict access to system components and cardholder data by business need to know

Access to cardholder data and CDE systems must be limited to personnel whose job requires it. Access control systems must default to “deny all” and grant access only when explicitly authorized. Role-based access control enforces least privilege.

Requirement 8: Identify users and authenticate access to system components

Every user must have a unique ID. PCI DSS v4.0 requires multi-factor authentication (MFA) for all access to the CDE, not just administrative access. Password requirements increased to minimum 12 characters (up from 8 in v3.2.1).

Requirement 9: Restrict physical access to cardholder data

Physical access to systems containing cardholder data must be controlled. This includes data centers, server rooms, and any location where cardholder data is present. Visitor logs, access badges, and video monitoring are standard controls.

Requirement 10: Log and monitor all access to system components and cardholder data

Logging mechanisms must track all access to network resources and cardholder data. Logs must include user identification, event type, date/time, success/failure, and data accessed. Log integrity must be protected, and logs must be reviewed at least daily.

Requirement 11: Test security of systems and networks regularly

Vulnerability scans (internal and external) must run at least quarterly. Penetration testing must occur annually and after significant changes. PCI DSS v4.0 adds requirement 11.6.1 for automated change detection on payment pages, with alerting on unauthorized modifications.

Requirement 12: Support information security with organizational policies and programs

A formal information security policy must exist and be maintained. This includes risk assessment processes, security awareness training, incident response procedures, and service provider management. Documentation requirements under v4.0 are extensive: penetration test reports, segmentation test results, vulnerability scans, risk assessments, training records, and incident response plans.

PCI DSS v4.0: key changes and transition timeline

PCI DSS v4.0 was released in March 2022 and became mandatory in March 2024 when v3.2.1 was retired. However, 51 requirements were future-dated, meaning organizations had until March 31, 2025 to implement them. Those requirements are now mandatory.

The 51 future-dated PCI DSS v4.0 requirements became mandatory on March 31, 2025. Organizations that have not implemented requirements 6.4.3, 11.6.1, expanded MFA, and the other future-dated controls are now non-compliant.

Date Milestone
March 2022 PCI DSS v4.0 released
March 2024 PCI DSS v3.2.1 retired, v4.0 mandatory
June 2024 PCI DSS v4.0.1 published (minor clarifications)
March 31, 2025 51 future-dated requirements became mandatory

Key v4.0 changes now in effect:

Requirement Change Impact
6.4.3 Payment page script inventory Full inventory, authorization, and integrity controls
11.6.1 Change detection on payment pages Automated monitoring at least every 7 days
8.3.6 MFA for all CDE access Applies to all access, not just remote admin
8.3.6 12-character minimum passwords Up from 8 characters in v3.2.1
Multiple Shift to continuous monitoring Risk-based frequencies, not just annual/quarterly

Requirement 6.4.3: Payment page script inventory and integrity

Organizations must maintain a complete inventory of all scripts executing on payment pages. Each script requires documented authorization and integrity verification mechanisms. This targets Magecart-style attacks where malicious scripts skim card data from payment forms.

Requirement 11.6.1: Change detection on payment pages

Automated detection and alerting on unauthorized modifications to payment pages, including HTTP headers and page content. Minimum frequency: every 7 days, or per a targeted risk analysis if more frequent.

Expanded MFA requirements

MFA is now required for all access to the CDE, not just remote administrative access. This applies to both onsite and remote access.

Password length increase

Minimum password length increased from 8 to 12 characters. Systems that cannot technically support 12 characters may use 8 as an exception.

Shift to continuous monitoring

PCI DSS v4.0 moves from periodic point-in-time validation toward continuous security monitoring. Organizations must define security control frequencies based on their own risk assessments rather than defaulting to annual or quarterly.

Determining your SAQ type and compliance scope

Self-Assessment Questionnaires (SAQs) vary in scope based on how your organization handles cardholder data. The difference is substantial: SAQ A contains 24 requirements, while SAQ D contains 328.

SAQ type Applicable to Requirements
SAQ A E-commerce merchants with fully outsourced card functions (no electronic storage, processing, or transmission of CHD) 24
SAQ A-EP E-commerce merchants using iframe/redirect, but whose website could affect payment page security 139
SAQ B Merchants using imprint machines or standalone dial-out terminals only 41
SAQ C Merchants with payment application systems connected to the internet, no electronic CHD storage 160
SAQ D All other merchants and all service providers 328

SAQ type depends on your payment architecture:

  • If cardholder data passes through your servers before reaching a payment processor, you face SAQ D or a QSA assessment
  • If you use an iframe or redirect where card data goes directly from the customer’s browser to the payment provider, you may qualify for SAQ A-EP or SAQ A
  • If your systems never touch cardholder data and you use a fully hosted payment page, SAQ A applies

The architecture decision happens at implementation, not at compliance time. Choosing the right integration pattern upfront determines your compliance burden for years.

Scope reduction strategies: tokenization and outsourcing

Scope reduction removes systems from your CDE, decreasing the number of controls you must implement and validate. The two primary mechanisms are tokenization and outsourcing payment handling to a PCI-compliant provider.

Tokenization

Tokenization replaces cardholder data with a non-sensitive token that has no exploitable value if stolen. The token can be used for recurring charges, refunds, and transaction references without exposing the actual card number.

Tokenization eliminates PCI scope when implemented correctly. The card data must pass directly from the customer’s browser to the tokenization service. If card data touches your servers before tokenization, those servers remain in scope.

According to the PCI Security Standards Council’s Tokenization Guidelines, effective tokenization requires:

  • Token generation occurs outside your systems
  • No reverse-engineering path from token to PAN exists in your environment
  • Token storage systems do not store or have access to PANs

Outsourcing to PCI-compliant providers

Using a payment orchestration platform with PCI Level 1 certification can shift compliance burden from your organization to the provider. Your CDE boundary shrinks to exclude systems the provider manages.

This does not eliminate all compliance obligations. You must:

  • Verify the provider’s Attestation of Compliance (AOC) annually, checking date, assessor, and scope
  • Review data flow diagrams to confirm card data routing matches what’s documented
  • Maintain a vendor risk management program
  • Complete your own SAQ covering the systems that remain in scope

The reduction is real: SAQ A’s 24 requirements versus SAQ D’s 328 represents a 93% decrease in compliance controls. For organizations seeking to expand payment capabilities without proportionally expanding their compliance team, this is the primary value of outsourcing.

What remains your responsibility

Regardless of outsourcing, you remain responsible for:

  • Vendor selection and due diligence
  • Ongoing monitoring of provider compliance status
  • Protecting any systems that connect to the provider
  • Incident response coordination if the provider has a breach
  • Contractual provisions (data processing agreements, breach notification terms)

The real cost of PCI compliance and non-compliance

PCI compliance costs vary by organization size and complexity. Non-compliance costs can exceed compliance costs by orders of magnitude.

Compliance costs vary by organization size:

Organization type Annual compliance cost
Small business (Level 4) $5,000-$20,000
Mid-size organization $50,000-$200,000
Level 1 merchant (first year) $245,000-$600,000
Level 1 merchant (ongoing) $160,000-$350,000

Source: Feroot Security, Centraleyes, 2025

QSA assessment costs depend on scope:

Assessment type Cost range
SAQ-assisted assessments $10,000-$40,000
Full Report on Compliance (ROC) $30,000-$200,000

Source: Thoropass, 2025

Card networks impose escalating fines for non-compliance:

Duration of non-compliance Monthly fine
Months 1-3 $5,000-$10,000
Months 4-6 $25,000-$50,000
Beyond 6 months $100,000

Source: Clone Systems, 2025

Data breach costs extend beyond fines. According to industry data compiled by Accutive Security, average breach costs by industry:

Industry Average breach cost
Healthcare $10.93 million
Financial services $5.97 million
Retail $3.28 million

Target’s 2013 breach, which exploited PCI compliance failures, cost $292 million in total.

Beyond direct costs, non-compliance can result in loss of card processing privileges, leaving a business unable to accept card payments.

How Orchestra reduces PCI compliance burden

Orchestra operates as a PCI Level 1 certified payment orchestration platform. By routing card data through Orchestra rather than your own systems, you can reduce your CDE boundary and qualify for a simpler SAQ type.

How the integration works

Orchestra’s JavaScript library loads directly in the customer’s browser. When the customer enters card details, that data passes from their browser to Orchestra’s tokenization service. Your servers receive a token, not the card number.

Because card data never touches your servers, your CDE is minimized or even eliminated entirely. If you previously faced SAQ D compliance (328 requirements), this architecture can qualify you for SAQ A (24 requirements).

What Orchestra handles

  • Secure card data collection via browser-based tokenization
  • PCI-compliant storage of card data in Orchestra’s vault
  • 3D Secure authentication where required for SCA compliance
  • Connections to 90+ payment providers through a single integration

What remains your responsibility

  • SAQ A completion and annual validation
  • Protecting your systems that connect to Orchestra’s API
  • Vendor due diligence (reviewing Orchestra’s AOC, completing your vendor risk assessment)
  • Incident response coordination

The cost of maintaining your own card vault often exceeds the cost of outsourcing. Vaulting requires PCI-compliant infrastructure, encryption key management, and ongoing QSA assessments for the vault itself. Outsourcing shifts those costs and responsibilities to the provider.

For organizations adding new payment methods, processors, or markets, Orchestra’s single integration prevents each addition from expanding your compliance scope. You add capabilities without adding CDE surface area.

Frequently asked questions

What SAQ type applies if I use a payment orchestration platform?

Using a payment orchestration platform with tokenization typically qualifies you for SAQ A (24 requirements) or SAQ A-EP, depending on whether your servers handle cardholder data. SAQ A requires all card data to pass directly from the customer’s browser to the tokenization service, with your servers receiving only tokens.

Does tokenization completely eliminate PCI scope for my systems?

Tokenization can eliminate scope when implemented correctly. Card data must pass directly from the customer to the tokenization service with no intermediate stops in your systems. You remain responsible for vendor management, protecting the systems that receive tokens, and completing the appropriate SAQ for your reduced scope.

What are the key differences between PCI DSS v3.2.1 and v4.0?

PCI DSS v4.0 adds over 130 new requirements including expanded MFA for all CDE access (not just remote admin), new payment page script controls (requirements 6.4.3 and 11.6.1), minimum 12-character passwords, and a shift from periodic validation to continuous monitoring. 51 of these requirements were future-dated and became mandatory March 31, 2025.

How does outsourcing payment processing affect my CDE boundary?

Outsourcing to a PCI-compliant provider removes those systems from your CDE, but you must verify the provider’s AOC (Attestation of Compliance), review their data flow diagrams to confirm data routing, and maintain a vendor risk management program. You remain responsible for the systems that connect to the provider and for completing your own SAQ.

What documentation do I need for a PCI DSS assessment?

Required documentation includes penetration testing reports, segmentation testing results, vulnerability scan reports, risk assessment reports, information security policy, training records, incident response plan, and data flow diagrams showing how cardholder data moves through your environment. PCI DSS v4.0 expanded documentation requirements compared to earlier versions.

How much does PCI DSS compliance cost?

Costs vary by organization size: small businesses typically spend $5,000-$20,000 annually, while large organizations face $50,000-$200,000. Level 1 merchants requiring full QSA assessments can expect $245,000-$600,000 in first-year costs and $160,000-$350,000 ongoing. QSA audits alone cost $30,000-$200,000 depending on scope.

What are PCI DSS requirements 6.4.3 and 11.6.1?

Requirement 6.4.3 mandates a complete inventory of all scripts executing on payment pages, with documented authorization and integrity controls for each script. Requirement 11.6.1 requires automated detection and alerting on unauthorized changes to payment pages, including HTTP headers and page content, at least every 7 days. Both became mandatory March 31, 2025.

What happens if you fail PCI compliance?

Non-compliance fines start at $5,000-$10,000 per month and escalate to $100,000 per month after six months of continued non-compliance. Additional consequences include potential loss of card processing privileges and liability for breach costs. Average breach costs exceed $4 million, with retail breaches averaging $3.28 million and financial services breaches averaging $5.97 million.

More recent articles