PCI DSS Compliance: Protect Cardholder Data and Avoid Costly Penalties
PCI DSS compliance services help businesses that process, store, or transmit credit card data meet the Payment Card Industry Data Security Standard. Vigil Cyber implements PCI DSS 4.0 requirements including network segmentation, access controls, vulnerability management, and continuous monitoring — protecting your ability to process payments.
PCI DSS 4.0: New Requirements That Are Now Mandatory
PCI DSS 4.0 was finalized in 2022 and became the sole active standard in March 2024. The 64 new future-dated requirements became mandatory on March 31, 2025. These include stronger requirements for targeted risk analysis, multi-factor authentication scope expansion, e-commerce skimming script monitoring, customized approach controls, and enhanced encryption validation. Organizations that have not addressed the 4.0 additions are now out of compliance — even if they passed their last annual assessment.
Who Needs PCI DSS and What It Requires
PCI DSS applies to any merchant, service provider, or organization that stores, processes, or transmits cardholder data — including primary account numbers (PAN), cardholder names, expiration dates, and service codes. The standard is maintained by the PCI Security Standards Council and enforced through the card brands: Visa, Mastercard, American Express, and Discover.
Compliance is validated through an annual assessment — either a Self-Assessment Questionnaire (SAQ) or a Report on Compliance (ROC) from a Qualified Security Assessor (QSA), depending on transaction volume and how cardholder data is handled. Most small merchants qualify for SAQ completion. Large merchants and service providers typically require QSA-led assessments.
For organizations in retail and hospitality, see how PCI DSS integrates with broader retail and e-commerce security requirements . Financial services organizations should also review financial services security .
Get a PCI DSS Gap AnalysisThe 12 PCI DSS Requirements
Network Security Controls
Firewalls and other network security technologies to protect the cardholder data environment.
Secure Configurations
Eliminate vendor-supplied defaults; apply secure configurations to all system components.
Protect Stored Account Data
Minimize cardholder data storage; protect stored data with encryption and truncation.
Protect Data in Transit
Encrypt transmission of cardholder data across open, public networks.
Anti-Malware
Protect systems from malware and maintain anti-malware solutions.
Secure Systems & Software
Develop and maintain secure systems and software; manage vulnerabilities.
Restrict Access
Restrict access to system components and cardholder data by business need to know.
Identify & Authenticate
Identify users and authenticate access to system components with strong controls.
Physical Access Controls
Restrict physical access to cardholder data and system components.
Log & Monitor
Log and monitor all access to system components and cardholder data.
Test Security
Test security of systems and networks regularly through vulnerability scanning and penetration testing.
Information Security Policy
Support information security with organizational policies and programs.
Selecting the Right Self-Assessment Questionnaire
Most merchants qualify for SAQ-based compliance validation rather than a full QSA-led assessment. The SAQ type you use determines which controls you must demonstrate — and selecting the wrong SAQ type exposes you to liability if your environment doesn't match the SAQ's assumptions.
Card-Not-Present Merchants
For e-commerce merchants that have fully outsourced all cardholder data functions to PCI DSS compliant third parties. No electronic storage, processing, or transmission on merchant systems.
Questions: ~22 questions
E-Commerce with Partial Outsourcing
For e-commerce merchants that partially outsource payment processing. Website may affect security of the payment transaction even if no cardholder data transits merchant systems.
Questions: ~191 questions
Imprint-Only or Standalone Terminals
For merchants using only imprint machines or standalone, dial-out terminals with no electronic cardholder data storage.
Questions: ~41 questions
Standalone IP-Connected Terminals
For merchants using standalone IP-connected payment terminals that do not store cardholder data and are isolated from other systems.
Questions: ~83 questions
Payment Application Systems
For merchants with payment application systems connected to the internet. No electronic cardholder data storage. Systems may be connected to other systems.
Questions: ~160 questions
All Other Merchants & Service Providers
For all merchants not qualifying for simpler SAQs, and for all service providers. Full PCI DSS requirements apply.
Questions: ~330+ questions
How Vigil Cyber Delivers PCI DSS Compliance
PCI DSS compliance requires continuous operation of security controls — not annual point-in-time testing. Vigil Cyber implements, monitors, and maintains the controls your assessment requires.
PCI DSS Gap Assessment
Scoping & Current State Analysis
Know your cardholder data environment boundary, your SAQ type, and every gap before your assessor does.
We identify all system components in scope — network segments that store, process, or transmit cardholder data — map data flows, determine the correct SAQ type or ROC pathway, and conduct a gap analysis against all applicable requirements. Proper scoping can significantly reduce assessment complexity and cost.
Network Segmentation
Cardholder Data Environment Isolation
Isolate the cardholder data environment to reduce PCI DSS scope and limit breach impact.
Network segmentation is the most effective way to reduce PCI DSS scope — and it dramatically reduces the blast radius if a breach occurs. We design and implement network segmentation that isolates the CDE from other systems, verify that segmentation controls prevent access from out-of-scope systems, and document the architecture in the format assessors require.
ASV Vulnerability Scanning
Approved Scanning Vendor
Quarterly external vulnerability scans from a PCI-approved scanning vendor — with remediation support.
PCI DSS requires quarterly external vulnerability scans by an Approved Scanning Vendor (ASV). Scans must achieve a passing result before submission. We manage the ASV scanning program, provide remediation guidance for failing vulnerabilities, and coordinate rescans until a passing result is achieved — ensuring you meet quarterly cadence requirements without scrambling before each assessment.
Access Control & MFA Implementation
Requirements 7 & 8
Enforce least-privilege access and multi-factor authentication across all CDE system components.
PCI DSS 4.0 expanded MFA requirements significantly — MFA is now required for all access into the CDE, including non-console administrative access and all access by personnel with administrative privileges. We implement and manage MFA across CDE systems, enforce least-privilege access controls, manage user lifecycle, and maintain the access review evidence assessors require.
Log Management & Monitoring
Requirement 10
Continuous logging of all access to CDE system components with alerting and review.
PCI DSS Requirement 10 mandates logging of all individual access to system components, all actions taken by individuals with root or administrative privileges, and access to all audit trails. Logs must be reviewed daily for critical systems. Our SIEM-based monitoring covers CDE log collection, correlation, daily review workflows, and 12-month log retention as the standard requires.
Endpoint Security & Patch Management
Requirements 5 & 6
Maintain anti-malware coverage and patch currency across all CDE system components.
All system components in the CDE must be protected by anti-malware solutions that are actively running and cannot be disabled by users. Critical patches must be installed within one month of release. We manage endpoint protection across CDE systems, implement the patch management program, and maintain the patch currency documentation that satisfies Requirement 6 testing.
Frequently Asked Questions
Merchants, e-commerce operators, and payment processors ask us these questions about PCI DSS compliance.
Ready to Secure Your Business?
Get a free security assessment and discover how Vigil Cyber can protect your organization for a fraction of the cost of building an internal team.
24/7
SOC Coverage
<1hr
Response Time
99.9%
Uptime SLA