Payment Card Industry Data Security Standard
The Payment Card Industry Data Security Standard is a global data security standard that regulates how entities store, process, and transmit cardholder data and/or sensitive authentication data. PCI DSS includes guidelines regarding components of organizations' technical and operational system that are related to such data. Cardholder Data refers to information including Primary Account Numbers, cardholder names, expiration dates, and service codes. Sensitive authentication data refers to information including "full track data," card verification codes, and PINs/PIN blocks. This standard is administered by the Payment Card Industry Security Standards Council, and its use is enforced by the major payment card brands. PCI DSS was created to improve and streamline the security controls organizations use when handling cardholder data and reduce credit card fraud. These organizations, including merchants and service providers, must prove compliance to the PCI DSS through an assessment and validation process. The payment card brands issue fines and other penalties when merchants or service providers fail to prove compliance. Validation of compliance is performed annually or quarterly with a method suited to the organization's volume of transactions:
- Self-assessment questionnaire
- Firm-specific Internal Security Assessor
- External Qualified Security Assessor
History
- Visa's Cardholder Information Security Program
- Mastercard's Site Data Protection
- American Express's Data Security Operating Policy
- Discover's Information Security and Compliance
- JCB's Data Security Program
MasterCard, American Express, Visa, JCB International and Discover Financial Services established the PCI SSC in September 2006 as a global administrative and governing entity that mandates the evolution and development of the PCI DSS. Independent private organizations can also participate in PCI development as part of the PCI Security Standards Council Participating Organization Program. To join that program, organizations must register as a PCI SSC Participating Organization. Each participating organization joins a SIG and contributes to activities mandated by the group.
The PCI DSS is a living document that is regularly updated by the PCI Security Standards Council. The PCI SSC releases major version updates, such as version 4.0, approximately every few years. Minor updates, such as version 4.0.1, are released more frequently and typically add small changes or clarifications. When updates are released, organizations have a transition period during which they must become familiar with the new changes and begin ensuring compliance with the current version. During the transition period, organizations are only required to be compliant with either the current version or the previous version. The following versions of the PCI DSS have been made available:
| Version | Date | Description |
| 1.0 | December 15, 2004 | |
| 1.1 | September 2006 | clarification and minor revisions |
| 1.2 | October 2008 | enhanced clarity, improved flexibility, and addressed evolving risks and threats |
| 1.2.1 | July 2009 | minor corrections designed to create more clarity and consistency among the standards and supporting documents |
| 2.0 | October 2010 | provided clarifications about the relationship between PCI DSS and PA-DSS, several additional guidelines regarding Requirement and Testing Procedure |
| 3.0 | November 2013 | active from January 1, 2014 to June 30, 2015 |
| 3.1 | April 2015 | retired since October 31, 2016 |
| 3.2 | April 2016 | retired since December 31, 2018 |
| 3.2.1 | May 2018 | retired since March 31, 2024 |
| 4.0 | March 2022 | retired since December 31, 2024, the biggest update and revision since v1.0: updated firewall terminology, expansion of Requirement 8 to implement multi-factor authentication, increased flexibility to demonstrate security, and targeted risk analyses to establish risk exposure operation and management |
| 4.0.1 | June 2024 | Currently, the only active version. The deadline for compliance with this version was March 31, 2025. minor revisions: correct typographical and other minor errors, update and clarify guidance, remove Definitions in guidance and refer to the Glossary instead, add references to the Glossary for newly defined glossary terms and for existing glossary terms that did not previously have references |
Requirements and control objectives
The PCI DSS has twelve requirements for compliance, organized into six related groups known as control objectives:- Build and maintain a secure network and systems
- Protect cardholder data
- Maintain a vulnerability management program
- Implement strong access control measures
- Regularly monitor and test networks
- Maintain an information security policy
- PCI DSS requirements: Define the requirement. The PCI DSS endorsement is made when the requirement is implemented.
- Testing: The processes and methodologies carried out by the assessor for the confirmation of proper implementation.
- Guidance: Explains the purpose of the requirement and the corresponding content, which can assist in its proper definition.
- Install and maintain network security controls.
- Apply secure configurations to all system components.
- Protect stored account data.
- Protect cardholder data with strong cryptography during transmission over open, public networks.
- Protect all systems and networks from malicious software.
- Develop and maintain secure systems and software.
- Restrict access to system components and cardholder data by business need to know.
- Identify users and authenticate access to system components.
- Restrict physical access to cardholder data.
- Log and monitor all access to system components and cardholder data.
- Test security of systems and networks regularly.
- Support information security with organizational policies and programs.
Updates and supplemental information
- Information Supplement: Requirement 11.3 Penetration Testing
- Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
- Navigating the PCI DSS - Understanding the Intent of the Requirements
- PCI DSS Wireless Guidelines
- PCI DSS Applicability in an EMV Environment
- Prioritized Approach for PCI DSS
- Prioritized Approach Tool
- PCI DSS Quick Reference Guide
- PCI DSS Virtualization Guidelines
- PCI DSS Tokenization Guidelines
- PCI DSS 2.0 Risk Assessment Guidelines
- The lifecycle for Changes to the PCI DSS and PA-DSS
- Guidance for PCI DSS Scoping and Segmentation
- PCI DSS v4.0 Resource Hub
- PCI DSS Summary of Changes: v4.0 to v4.0.1
Merchant levels
- Level 1 – Over six million transactions annually
- Level 2 – Between one and six million transactions annually
- Level 3 – Between 20,000 and one million transactions annually, and all e-commerce merchants
- Level 4 – Less than 20,000 transactions annually
Service provider levels
According to the PCI DSS, third-party service providers that store, process, or transmit cardholder data, or have access to customers’ account data are subject to PCI DSS standards. Service providers can include payment software vendors, software as a service, data centers, and other such entities. Service providers are required to prove PCI DSS compliance through the assessment process. The type of reporting process a service provider must complete are dependent on the type of service provider. Service providers are classified into levels which determine the reporting required for compliance. The two service provider levels are:- Level 1:
- * All Third-Party Processors
- * All Staged Digital Wallet Operators
- * All Digital Activity Service Providers
- * All Business Payment Service Providers
- * All Token Service Providers
- * All 3-D Secure Service Providers
- * All Installment Service Providers
- * All Merchant Payment Gateways
- * All AML/Sanctions Service Providers, Data Storage Entities and Payment Facilitators with more than 300,000 total combined Mastercard and Maestro transactions annually
- Level 2:
- * All AML/Sanctions Service Providers, DSEs6 and PFs with 300,000 or less total combined Mastercard and Maestro transactions annually
- * All Terminal Servicers