“We don’t need to worry about PCI—our payment provider handles it.”
It’s a line we hear often in the field—from merchants, franchisees, and independent operators alike. And while it sounds reassuring, it’s dangerously misleading.
The assumption is simple: if your payment processor is PCI compliant, then you must be too. But that’s not how PCI DSS works.
Third-party providers can absolutely help reduce your PCI burden—but they don’t eliminate your obligations. In fact, misunderstanding where their role ends and yours begins can quickly expose your business to serious compliance gaps, costly penalties, and reputational risk.
Before you assume PCI is “taken care of,” here’s what you need to know.
The Allure of “Outsourced Compliance”
Merchants, especially in owner-operator and franchiser settings, live under relentless pressure to operate lean—juggling vendors, managing staff, and keeping customers happy. When a payment processor says, “We’re PCI compliant, so you don’t need to worry about it,” it sounds like a magical fix: No audits, no forms, no training, no risk.
But that’s not how PCI works.
Here’s why that message is marketing shorthand, not reality:
- Scope Reduction ≠ Scope Elimination
Third-party providers often offer PCI-compliant solutions—like P2PE, hosted pages, or tokenization—that reduce the merchant’s PCI scope. But this doesn’t free the merchant entirely.
Tripwire, discussing PCI DSS v4.0, emphasized that while outsourcing can reduce a merchant’s scope—akin to tax deductions—the ultimate responsibility for PCI compliance and validation still lies with the merchant.
- Marketing Messages Can Be Misleading
Vendors may promote messages like “we handle PCI,” but slick claims don’t guarantee coverage. Vendors may only hold Attestations of Compliance (AOCs) for specific services—leaving merchants exposed if their actual usage doesn’t align.
- You’re Still Accountable
PCI DSS v4.0 highlights shared responsibility: Merchants must list all Third-Party Service Providers (TPSPs), assess them annually, and maintain written agreements—yet legal and reputational liability remains squarely with the merchant.
- Reality Check: You May Still Need an SAQ
Even with a compliant provider, a merchant typically must complete a Self-Assessment Questionnaire (SAQ); which requires annual completion and documentation.
Embedding third-party scripts or iframes may force merchants out of SAQ A qualification, unless they actively monitor and control how those scripts impact cardholder data environments.
So, what does that full statement really mean?
“We’re PCI compliant.” ≠ “You’re PCI compliant.”
- Your payment processor may be PCI compliant for certain systems or services—but that doesn’t guarantee their compliance aligns with your deployment.
- Compliance relief is legitimate—but only for the components in scope that you do not touch.
- If anything falls outside that scope—e.g., network setup, staff practices, terminal security—you’re still responsible.
- And if a breach happens, you’re still the one regulators will call.
How Payment Providers Actually Reduce the Burden
To be fair, most modern processors and payment platforms offer real value in simplifying compliance—particularly through technologies like:
- Point-to-Point Encryption (P2PE): Encrypts cardholder data from the moment it’s captured, reducing its exposure. A PCI-validated P2PE solution reduces your SAQ from a detailed SAQ D (often 329 questions) to a compact SAQ P2PE with as few as 21–35 questions. However, this doesn’t completely eliminate compliance—you still must validate your P2PE setup, maintain the physical security of terminals, manage key injection processes, and perform annual assessments.
- Tokenization: Replaces sensitive data with non-sensitive equivalents, rendering breaches less harmful. However, the tokenization service itself must be securely implemented and managed. Vulnerability in the token vault or integration could reintroduce exposure.
- Hosted Payment Pages or EMV Devices: Keeps card data entirely out of the merchant’s environment. However, if your site uses embedded scripts or iframes that handle card data, your scope increases, which could require a more comprehensive SAQ like SAQ A-EP
But notice what didn’t happen: The need for a Self-Assessment Questionnaire didn’t disappear. Merchants still must validate compliance—just with fewer controls to account for.
Shared Responsibility: Who Owns What?
Just like cloud providers clearly define the division of responsibility (e.g., AWS/Azure secures the infrastructure, while you handle your apps and data), PCI compliance also relies on a shared responsibility model between merchant and service provider.
Provider vs. Merchant: Who Owns What?
Your processor might handle certain parts—such as encrypting data in transit, safely storing it, and securing their infrastructure.
But the following remain entirely your responsibility:
- Securing your local network (e.g., segmenting POS from public Wi‑Fi)
- Employee practices (e.g., preventing manual card data capture)
- Physical terminal security (e.g., guarding against tampering or theft)
- Annual SAQ validation (e.g., identifying and completing the right Self-Assessment Questionnaire)
Failure in any of these areas can lead to a breach—and regulators, acquirers, and card brands will hold YOU accountable.
Merchant Liability Persists Even When a Breach Originates with Your Provider
PCI DSS v4.x underscores that liability doesn’t shift just because you outsource. If you embed a processor’s iFrame or script in your checkout, Requirement 6.4.3 mandates that you manage and monitor those scripts; Requirement 11.6.1 requires header integrity monitoring.
Even with full outsourcing, you must annually revalidate your PCI scope—documenting what your provider covers and what falls to your organization.
A Framework for Shared PCI Ownership
- Contracts matter. Clearly define PCI responsibilities in your agreements—including incident response and liability—before going live.
- Ongoing monitoring is essential. Regularly audit your provider’s compliance and ensure they supply updated AOCs and evidence as required.
- Own your environment. You are obligated to assess and secure every aspect you control—from network to staff training to script hygiene.
What Happens When It Goes Wrong?
Imagine a franchisee relying on a payment processor that says, “PCI is handled—don’t worry about it.” They skip completing an SAQ, ignore security controls, and trust the provider implicitly with terminal deployment and network setup.
Then disaster strikes: A breach occurs. Cardholder data is exposed. The acquiring bank acts swiftly.
Immediate Consequences
- Forensic Audit
A full forensic investigation is mandated to determine the breach’s extent, configuration failures, and data loss—at the merchant’s expense.
- Fines from Card Brands and Banks
Under PCI DSS v4.x, noncompliant merchants can incur fines starting at $5,000–$10,000 per month and reaching $100,000 monthly if issues persist.
- Reputational Damage
IBM reports that data breaches averaged $4.88 million globally in 2024—devastating both finances and brand trust.
- Loss of Payment Processing Rights
Card brands and acquirers may terminate payment privileges—effectively cutting off a merchant’s ability to operate.
That vendor promise, “We’ve got PCI covered,” only applied to certain parts of the system, not your responsibility as the merchant. When a breach occurs, you’re still the one facing the consequences because PCI DSS doesn’t allow full liability transfer.
Have You Read the Fine Print?
The truth is that most providers do spell this out somewhere—in lengthy service agreements or support documentation. But very few merchants actually read or interpret those sections correctly.
So, let’s ask yourself a few direct questions:
- Have you validated your own PCI scope?
- Do you know which SAQ applies to your setup?
- Have you confirmed what happens in the event of a breach—who’s liable, who reports, who remediates?
- If your payment provider says, “We’re covered,” can you prove that means you’re covered?
If the answer is no, your organization is potentially carrying far more risk than you think.
Your provider says they’ve got PCI covered—but have you read the fine print?
Compliance is a Partnership, not a Transfer
The payment ecosystem is evolving fast. New providers bring new tools, new tech, and new promises. But no matter how advanced the platform is, one truth remains:
PCI DSS compliance is not something you can outsource entirely.
You can reduce scope. You can automate controls. You can work with providers who simplify the process. But responsibility always rests with the merchant to validate and maintain their side of the equation.
That’s not just a compliance issue—it’s a business continuity issue. A brand protection issue. A revenue protection issue.
The good news? You don’t have to go it alone. VikingCloud works with merchants and franchise operators every day to map their real PCI scope, manage vendor risk, and close the gaps that make them vulnerable.
If you want another professional opinion, book a call with a member of our team today.