Secure Controls Framework
↓ Download SCF
GRC Fundamentals ▼
SCF Certified ▼
Organization-Level SCF Certifications
SCF Conformity Assessment Program (CAP)SCF Assessment Guides
SCF Training & Individual-Level Certifications
SCF PractitionerSCF ArchitectSCF Assessor
FAQAboutSwag
GRC Fundamentals

Payment Card Industry Data Security Standard

A GRC practitioner’s guide to PCI DSS — covering the history of the standard, merchant and service provider obligations, the 12 core requirements, compliance validation methods, and the role of quality documentation in maintaining ongoing conformity.

Common Controls Framework™

The SCF maps to PCI DSS, enabling organizations to align cardholder data environment security controls with the payment industry’s global standard. While not a government mandate, PCI DSS is a contractual obligation enforced by the major card brands via the PCI Security Standards Council.

Framework Overview

GRC-Focused Overview of PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) is one of the most established and globally recognized cybersecurity compliance frameworks. It was developed to protect cardholder data from compromise and ensure that all entities involved in payment card processing maintain robust security controls.

While not a government-mandated regulation, PCI DSS is a contractual obligation enforced by the major card brands (e.g., Visa, MasterCard, American Express, Discover and JCB) via the PCI Security Standards Council (PCI SSC). Its requirements are not optional for organizations that handle payment card data. Whether a merchant, service provider or third-party processor, compliance with PCI DSS is critical to minimizing financial liability, protecting consumer trust and reducing the risk of data breaches.

This page provides a cybersecurity-focused summary of PCI DSS from a GRC practitioner’s perspective, including the history of the framework, practical compliance strategies and the role of high-quality documentation to be secure, compliant and resilient.

Name
Payment Card Industry Data Security Standard (PCI DSS)
Type
Framework
Authoritative
Source
PCI Security Standards Council
Cost To Use
No direct licensing fee, though compliance validation (QSA engagements, scanning, penetration testing) involves costs.
Certification
Available
No formal certification. A Qualified Security Assessor (QSA) may issue a Report on Compliance (ROC) for Level 1 merchants and service providers.
TL / DR — Too Long / Didn't Read

While not a government-mandated regulation, PCI DSS is a contractual obligation enforced by the major card brands via the PCI Security Standards Council (PCI SSC). Its requirements are not optional for organizations that handle payment card data. Whether a merchant, service provider, or third-party processor, compliance with PCI DSS is critical to minimizing financial liability, protecting consumer trust and reducing the risk of data breaches.

Origins & History

Origins of PCI DSS

The early 2000s witnessed a dramatic rise in credit card fraud and large-scale data breaches targeting merchants and payment processors. In response, individual card brands introduced proprietary security programs, such as Visa’s Cardholder Information Security Program (CISP) and MasterCard’s Site Data Protection (SDP) program. However, these separate efforts led to confusion and inconsistent application of security standards.

To consolidate and unify data protection requirements across the industry, the PCI Security Standards Council (PCI SSC) was founded in September 2006 by the five major card brands. The Council is an independent body charged with managing the development and evolution of PCI security standards, including PCI DSS (Data Security Standard), PA-DSS (Payment Application Data Security Standard), PTS (PIN Transaction Security) and PCI P2PE (Point-to-Point Encryption).

PCI DSS Version Milestones

Version 1.0 (2004)

Joint standardization of security requirements across card brands, replacing the fragmented proprietary programs of individual card brands.

Version 2.0 (2010)

Clarified ambiguous requirements and improved guidance based on merchant and assessor feedback accumulated since Version 1.

Versions 3.0–3.2.1 (2013–2018)

Strengthened controls, introduced multi-factor authentication requirements, and clarified service provider accountability obligations.

Version 4.0 (March 2022)

Major overhaul introducing flexible, objective-based requirements, risk-based validation and modernization for evolving threats including e-commerce and cloud environments.

Scope

Who Must Comply and the 12 Core Requirements

Any organization that stores, processes or transmits cardholder data (CHD) or sensitive authentication data (SAD) must comply with PCI DSS. Merchants are classified into four levels based on annual transaction volume, with Level 1 (over 6 million transactions/year) facing the most stringent reporting and validation requirements. Service providers — including third-party organizations that manage payment infrastructure, provide tokenization, fraud monitoring, or managed security services — are subject to annual third-party assessments and more rigorous oversight requirements.

Core Requirements

The 12 Core Requirements

PCI DSS defines 12 core requirements organized under six overarching objectives, representing a minimum baseline of technical, operational and administrative controls needed to protect cardholder data.

Req. 1 — Network Security Controls

Install and maintain network security controls (NSCs) to protect the cardholder data environment.

Req. 2 — Secure Configurations

Apply secure configurations to all system components, eliminating vendor defaults and unnecessary services.

Req. 3 — Protect Stored Account Data

Protect stored account data through encryption, truncation, masking and other data protection controls.

Req. 4 — Encrypt Transmission

Protect cardholder data with strong cryptography during transmission over open, public networks.

Req. 5 — Protect Against Malware

Protect all systems and networks from malicious software through anti-malware solutions and practices.

Req. 6 — Secure Systems and Applications

Develop and maintain secure systems and applications through patching and secure development practices.

Req. 7 — Restrict Access

Restrict access to system components and cardholder data by business need to know.

Req. 8 — Identify and Authenticate Users

Identify users and authenticate access to system components using strong authentication controls including MFA.

Req. 9 — Restrict Physical Access

Restrict physical access to cardholder data and system components through physical access controls.

Req. 10 — Log and Monitor

Log and monitor all access to network resources and cardholder data to enable detection of anomalies.

Req. 11 — Test Security

Test the security of systems and networks regularly through vulnerability scanning and penetration testing.

Req. 12 — Information Security Policy

Support information security with organizational policies, programs, risk assessments and awareness training.

Conformity Methods

Common Methods to Achieve and Maintain Conformity With PCI DSS

Compliance with PCI DSS is not a one-time task — it is an ongoing, lifecycle-driven process that includes assessment, remediation and validation.

Define the Cardholder Data Environment (CDE)

The first and most important step is to determine the scope of the CDE, including systems that store, process or transmit cardholder data, systems connected to the CDE, and all people, processes and technologies involved in card handling. Reducing CDE size through network segmentation and tokenization is a common strategy to limit audit scope and reduce risk.

Conduct a Gap Assessment

Organizations perform a self-assessment or engage a Qualified Security Assessor (QSA) to identify gaps between current practices and PCI DSS requirements, including control mapping, vulnerability identification, risk prioritization and remediation planning.

Implement or Remediate Controls

Based on the gap analysis, organizations deploy or configure technical controls (e.g., encryption, firewalls, MFA), update security policies and procedures, train staff and enforce acceptable use policies, and remediate identified vulnerabilities or findings.

Validate Compliance Annually

Depending on entity type and level, validation involves a Self-Assessment Questionnaire (SAQ) for lower-level merchants, a Report on Compliance (ROC) performed by a QSA for Level 1 merchants and all service providers, and an Attestation of Compliance (AOC) as a formal declaration of PCI DSS conformance.

Maintain Continuous Compliance

Key continuous activities include quarterly vulnerability scanning with an Approved Scanning Vendor, annual penetration testing and segmentation validation, real-time logging and monitoring, and periodic policy reviews and employee training. Failure to maintain ongoing compliance can invalidate prior attestations and reintroduce liability.

Role Of Documentation

The Indispensable Role of Documentation In PCI DSS

While PCI DSS emphasizes control implementation and validation, documentation is integral to nearly every requirement. Outdated or boilerplate documentation is a top reason for PCI DSS audit findings. QSAs are trained to distinguish between real evidence and compliance theater. Organizations that treat documentation as part of the security lifecycle are far more likely to pass assessments with minimal remediation.

Demonstrates Operational Governance

Security policies (Req. 12) outline expectations for system configuration, access, monitoring and acceptable use. Incident response plans (Req. 12.10) define processes for breach containment, escalation and recovery. Network diagrams and data flow maps (Req. 1.1.2, 1.1.3) clarify scope and control placement.

Satisfies Evidence Requirements

QSAs and acquirers require written proof that controls exist and are effective. Documentation supports audit trails, proving ongoing control operation through logs, vulnerability scans and access records. Training logs, risk assessments, vendor agreements and encryption key management logs are all common audit targets.

Enables Repeatability and Continuous Improvement

Repeatable procedures for patch management, access provisioning and change control reduce human error and audit risk. Written standards enforce consistency across decentralized teams and systems. Documentation creates institutional knowledge and reduces key-person risk.

Reduces the Risk of Scope Creep

Clear scoping documents help isolate the CDE and justify segmentation controls. Updated network and data flow diagrams provide evidence that non-CDE systems are truly out of scope, protecting the organization from unintended audit expansion.

Download the SCF — Free

The SCF is the Common Controls Framework™ (CCF™) — a free, volunteer-driven metaframework with 1,400+ controls across 33 domains and 200+ law, regulation, and framework mappings including PCI DSS.