CYBERSECURITY
compliance & RISK
INDUstry
Resources
OUR TECHNOLOGY
If you run a business that handles and processes debit or credit card information, it’s essential that you meet all 12 major requirements set by the Payment Card Industry Security Standards Council (PCI SSC).
Failure to meet PCI compliance can result in higher transaction fees and the loss of card processing privileges. Furthermore, non-compliance can lead to legal action and increased scrutiny from data regulators.
In this guide, we explore what PCI compliance means in practice, who needs to comply, what’s required, and the best practices you can put into action right away.
Understanding and adhering to PCI compliance on an ongoing basis helps to keep your business and customers safe from evolving cyberattacks.
However, according to Verizon, less than 50% manage to fully maintain compliance year on year, and the key to maintaining compliance is a robust PCI compliance program.
Organizations also need to understand the threat landscape and updates made to the PCI DSS to reduce risk with ever-evolving threats. For example, the most recent updates to the standard include protection against e-skimming. You can find more information in the “Exploring the New PCI DSS Requirements” eBook from VikingCloud.
PCI compliance is more critical than ever, considering 97% of U.S. top retailers have experienced third-party data breaches in the past year.
PCI DSS (Payment Card Industry Data Security Standard) compliance ensures that merchants keep the cardholder data they process as secure as possible against fraud and theft, such as in the event of a cyberattack.
It covers a series of payment security recommendations agreed upon by the card brands and is overseen by the PCI SSC.
Complying with PCI DSS helps reduce the risk of cyberattacks, data breaches, and associated costs while boosting customer confidence in your brand. It supports your overall risk management strategies and aligns with other compliance frameworks like NIST and GDPR.
Additionally, PCI DSS compliance streamlines business processes, improves vendor relationships, and ensures adherence to global standards set by card issuers.
Compliance is contractually enforced by major card brands and acquiring banks, meaning you’re at risk of fines and higher transaction costs if you don’t comply. You are not legally required to be PCI compliant, and it’s not enforced by government agencies or the PCI SSC.
However, non-compliant companies risk civil legal action if card data is leaked and may come under greater scrutiny from data regulators – for example, those ensuring firms adhere to CCPA, GDPR, and HIPAA.
Parties involved in compliance include card brands and networks such as Mastercard, Visa, JCB International, and American Express, and payment gateway and handling services such as PayPal, Stripe, and Square.
The parties involved with your compliance depend entirely on who you process payments with. Therefore, we always recommend that our customers check the compliance rules and standards set by the networks they trade with.
If your business uses any card service, you’ll need to comply with PCI DSS. This includes operators such as merchants, payment processors, banks, card issuers, software developers, and third parties that facilitate card payments.
The PCI DSS also applies to companies within these remits, regardless of size or payment channels.
Most importantly, PCI DSS also applies if you don’t store data from cardholders after processing—merely handling and processing, or having the ability to impact the security of this information, is enough to warrant compliance.

Whether your business processes 10 card transactions per year or 10 million, you must comply with the Payment Card Industry Data Security Standard (PCI DSS).
The more card transactions you process, the greater the risk of potential data breaches and security incidents. To help address this, PCI DSS categorizes businesses into four tiers based on their overall size and the volume of card transactions they process annually.
All merchants storing, processing, or transmitting cardholder data must be PCI-compliant. Compliance levels vary depending on the card issuer and processor involved. As an example, we’ve put together a quick summary of Mastercard’s levels for merchants:
Mastercard recommends that businesses contact their acquiring banks to ensure they confirm their merchant levels. More information is available directly through Mastercard.
Of course, if your company doesn’t use Mastercard, you will need to consult the rules set by Visa, Square, JCB, or others as applicable.

PCI DSS is focused on safeguarding cardholder data, no matter where it is transmitted, processed, or stored. It organizes its requirements into six control objectives, encompassing 12 specific compliance requirements.
The Six PCI DSS Control Objectives Are:
Under PCI DSS, the six primary objectives are further broken down into 12 compliance requirements. These objectives and requirements cover network security, account data protection, vulnerability management, access control and user authentication, system protection and security maintenance, training and policy setting, security testing, and physical safeguarding.
These standards apply to any business that processes, stores, or transmits credit card information, regardless of size or transaction volume. VikingCloud helps our customers manage and protect their data across all 12 requirements.
Let’s explore the 12 compliance requirements defined by PCI SSC and an example strategy for staying compliant at each step.
Install a functional firewall to protect against cyberattacks, and to continually test network connections for vulnerabilities. Processes such as penetration testing can help to find network weaknesses.
Regularly change passwords and amend user access controls, reducing functionality, and apply secure configurations as and where needed. Change password settings across networked devices and internal portals.
Take steps to encrypt and securely store account data, including cardholder data, to protect it against both internal and external threats. Limit storage options, vet cloud storage vendors, and physically protect any on-site storage.
Apply TLS 1.1 or higher encryption to websites and web applications, and follow data encryption and truncation methods to make cardholder data unusable if transferred. Avoid sending complete card data through channels such as email or IM, where hackers can intercept it.
Install, run, and regularly update antivirus and anti-malware protection, and consult professional vulnerability scanning services.
Develop clear processes and policies to regularly update, check, and maintain system security across your entire infrastructure. Ensure that mobile and web applications are developed securely and protected as needed.
Store cardholder data only when necessary, and if this is the case, restrict access to personnel who require this information.
Implement multi-factor authentication, biometrics, and even AI access controls to double up on ID checks – don’t just use simple passwords.
Store data securely in physical storage, implement multi-factor authentication, and install security monitoring equipment. In retail environments, secure and monitor POIs (Terminals) to detect tampering.
Maintain thorough login audits, track user behavior, and regularly review access logs for signs of unauthorized access to cardholder data.
Regularly scan and test for vulnerabilities externally using an Approved Scanning Vendor and internally using authenticated scans. Perform penetration tests, monitor traffic that can access sensitive data, update and test IoT devices, and upgrade equipment wherever necessary.
Establish a clear set of security policies that employees can follow and implement. Refresh these policies regularly and provide top-up staff training on the latest threats. Ensure that you manage your third-party service providers. Establish an incident response plan.
Becoming PCI compliant can be a complex process. It usually involves assessing your current security posture, implementing necessary controls, and then validating and maintaining your new posture in line with compliance requirements.
Here are some more details on how to ensure PCI compliance for small businesses:
PCI compliance service costs vary depending on the payment partners you work with, the size of your organization, and the cybersecurity professionals you enlist. It could cost you anywhere between hundreds of dollars and six-figure sums to keep compliant.
What’s more, laying out your infrastructure and carefully analyzing your current security controls can take considerable time and effort with professional support.
However, non-compliance can be much more expensive – and damaging – in the long run. You could lose money through:
We always encourage our customers to consider the costs of the worst-case scenario compared to the initial costs of cybersecurity and PCI compliance.

Some of the best PCI compliance practices we recommend to our clients include following strong data security measures, updating training, using PCI-compliant processors, and storing data only when necessary.
We also suggest choosing systems and software that make compliance easy and that you update security policies regularly.
Here’s a deeper dive into these 5 best practices:
What’s more, we always suggest that you use systems that PCI SSC recommends to avoid all doubt that you’re following the right processes. You should always seek assistance from cybersecurity professionals to scan, audit, and identify potential data risks.
PCI compliance resources include the PCI SSC’s help center, your payment processor’s support team, self-assessment tools and SAQs, qualified QSAs, and cybersecurity experts.
Here’s a breakdown of where to go for help if you need it:
Above all, remember that becoming PCI DSS compliant isn’t a one-off process. You should take steps to maintain your cardholder data privacy and security all year round, and VikingCloud is here to help.
To learn more about how we can help you secure your cardholder data and ensure you meet compliance demands, contact our team now for a free consultation.
Yes, PCI DSS applies to any business that handles cardholder data. The method of acceptance doesn't change compliance requirements.
Yes, using a processor doesn’t exempt you from PCI DSS. While it may reduce exposure and reduce compliance efforts, ultimately, you’re still responsible for ensuring data is handled securely. It’s also your responsibility to verify that your processor is PCI compliant and to ensure your systems and processes comply with applicable requirements.
If all locations use the same Tax ID, you typically validate once annually. However, quarterly scans by a PCI SSC Approved Scanning Vendor (ASV) may still be required for each location.
Service providers must typically complete SAQ D for Service Providers if they are eligible. This is the most comprehensive of the SAQs and applies to entities that process, store, or transmit cardholder data on behalf of other businesses. The correct SAQ depends on how your e-commerce site is structured. We advise our clients to learn more about this in our PCI SAQ 3.1 guide or contact us for the right fit.
Yes, accepting cards in any form triggers PCI obligations. Not storing data reduces scope but doesn’t eliminate compliance. Ultimately, we advise our customers that PCI compliance is more straightforward but still required in these situations.
Yes, PCI DSS includes all credit, debit, and prepaid cards from major brands. This applies regardless of transaction type.
No, SSL is only one part of the equation. Full PCI compliance involves broader security controls. We suggest exploring the information on level 4 merchant requirements in the guide above, ensuring a secure connection between the customer’s browser and the web server, as well as validation that the website operators are a legitimate, legally accountable organization.
We advise customers that it's often easier to avoid storing credit card information. However, those that set up recurring billing or other regular payments can use third-party vault and tokenization services to safely store data. Using a vault replaces sensitive card data with a secure token, enabling recurring billing without storing the data yourself. If you store card data internally, you face stricter PCI DSS requirements and may be required to undergo an on-site audit by a Qualified Security Assessor (QSA).
Note: Sensitive Authentication Data (such as CVV, PINs, and magnetic stripe data) must never be stored after authorization, even if encrypted. This is a strict PCI DSS violation.
Fines range from $5,000 to $100,000 per month at the discretion of the specific payment brand. Non-compliance can also result in higher fees or account termination. Banks often pass fines down to merchants, potentially leading to higher fees or terminated relationships. Though rarely publicized, these penalties can be devastating for small businesses. Review your merchant account agreement to understand your risk.
Cardholder data includes the full Primary Account Number (PAN) alone or with name, expiration, or service code. Sensitive Authentication Data, which must also be protected, includes full magnetic stripe data, CAV2, CVC2, CVV2, CID, PINs, PIN blocks, and more.
Anyone accepting card payments for goods or services is a merchant. Some may also act as service providers, depending on their role. We suggest that you learn more about different merchant roles in our post here. The PCI SSC defines a merchant as any entity that accepts payment cards bearing the logos of Visa, Mastercard, American Express, Discover, or JCB for goods or services.
The PCI SSC defines a Service Provider as a:
“Business entity that is not a payment brand, directly involved in the processing, storage, or transmission of cardholder data. This also includes companies that provide services that control or could impact the security of cardholder data.”
The “merchant as a service provider” role is further specified as “a merchant that accepts payment cards as payment for goods and/or services…if the services sold result in storing, processing, or transmitting cardholder data on behalf of other merchants or service providers.” Learn more about how to achieve compliance as a Service Provider in our post.
The term payment application has a very broad meaning in PCI. Any software that stores, processes, or transmits card data qualifies. This includes POS systems and online shopping carts. Ultimately, we advise our clients that any piece of software designed to touch credit card data is considered a payment application.
SSF refers to Secure Software Framework and includes both Secure Software Standard and Secure SLC standard. The secure software standard ensures payment apps support PCI compliance and avoids storing sensitive data. Vendors should follow it to keep their apps secure.
PCI SSC maintains a list of validated applications
PCI DSS requires masking PAN when displayed—showing only the first six and last four digits. While full card numbers and expiry dates may be printed on receipts, stricter laws, such as the FACTA (Fair and Accurate Credit Transactions Act of 2003), take precedence. Merchants must also follow PCI DSS physical security rules for stored paper receipts.
A vulnerability scan is a non-intrusive, automated test of a merchant’s or service provider’s external-facing systems to identify security weaknesses. Performed by an Approved Scanning Vendor (ASV), it detects potential risks without installing software or disrupting services.
If you store cardholder data post-authorization or qualify for certain SAQs, a quarterly passing scan by a PCI SSC Approved Scanning Vendor (ASV) is required. This applies to SAQ types A, A-EP, B-IP, C, D-Merchant, and D-Service Provider under PCI DSS v4.x.
You must complete a passing scan every 90 days. Results are submitted to your acquirer as proof of compliance.
We recommend that all our clients maintain PCI compliance. PCI DSS is not a law, but a security standard created by major card brands (Visa, Mastercard, Discover, AMEX, JCB). Non-compliant merchants risk fines, audits, card replacement costs, and reputational damage if a breach occurs. Investing in PCI compliance upfront helps avoid these costly consequences.s
Yes, home networks are common targets due to weaker security. Hackers often exploit unsecured systems and always-on connections.
Payment card data breaches can happen to businesses of any size—even though many are preventable. If your small or mid-sized business experiences a breach, there are trusted resources to guide your response:
Absolutely. California led the way with its 2003 data breach notification law, prompting nearly all other states to follow suit. As of April 12, 2017, 48 states, along with D.C., Guam, Puerto Rico, and the Virgin Islands, have laws requiring entities to notify individuals of breaches involving personally identifiable information.
Federal Trade Commission. (2003). Fair and Accurate Credit Transactions Act of 2003. Retrieved March 24, 2025, from https://www.ftc.gov/legal-library/browse/statutes/fair-accurate-credit-transactions-act-2003
General Data Protection Regulation (GDPR). (n.d.). Regulation (EU) 2016/679. from https://eurlex.europa.eu/eli/reg/2016/679/oj/eng
Health and Human Services (HHS). (n.d.). HIPAA privacy rule and compliance. Retrieved March 24, 2025, from https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html
Mastercard. (n.d.). Site data protection – PCI for merchants. Retrieved March 24, 2025, from https://www.mastercard.us/en-us/business/overview/safety-and-security/security-recommendations/site-data-protection-PCI/merchants-need-to-know.html
Payment Card Industry Security Standards Council (PCI SSC). (n.d.-a). SAQ Instructions and Guidelines. https://docs-prv.pcisecuritystandards.org/SAQ%20(Assessment)/Instructions%20%26%20Guidance/SAQ-Instructions-Guidelines-PCI-DSS-v4-0-1-r1.pdf
Payment Card Industry Security Standards Council (PCI SSC). (n.d.-b). What merchants need to know. Retrieved March 24, 2025, from https://www.pcisecuritystandards.org/merchants/
Payment Card Industry Security Standards Council (PCI SSC). (n.d.-c). Secure Software Standard, from https://docs-prv.pcisecuritystandards.org/Software%20Security/Standard/PCI-Secure-Software-Standard-v1_2_1.pdf
Payment Card Industry Security Standards Council (PCI SSC). (n.d.-d). Approved Scanning Vendors. Retrieved March 24, 2025, from https://listings.pcisecuritystandards.org/assessors_and_solutions/approved_scanning_vendors
Payment Card Industry Security Standards Council (PCI SSC). (n.d.-e). Glossary – Service Provider. Retrieved March 24, 2025, from https://www.pcisecuritystandards.org/glossary/service-provider/
Payment Card Industry Security Standards Council (PCI SSC). (n.d.-f). Completing the self-assessment. Retrieved March 24, 2025, from https://listings.pcisecuritystandards.org/pci_security/completing_self_assessment
Payment Card Industry Security Standards Council (PCI SSC). (n.d.-g). Responding to a cardholder data breach. Retrieved March 24, 2025, from https://www.pcisecuritystandards.org/documents/Responding_to_a_Cardholder_Data_Breach.pdf
Payment Card Industry Security Standards Council (PCI SSC). (n.d.-h). Homepage. Retrieved March 24, 2025, from https://www.pcisecuritystandards.org/
State of California Department of Justice. (n.d.). California Consumer Privacy Act (CCPA). Retrieved March 24, 2025, from https://oag.ca.gov/privacy/ccpa
U.S. Department of Justice. (2015, April 29). Best practices for victim response and reporting of cyber incidents. Retrieved March 24, 2025, from https://www.justice.gov/sites/default/files/opa/speeches/attachments/2015/04/29/
criminal_division_guidance_on_best_practices_for_victim_response_and_reporting_cyber_incidents2.pdf
Verizon. (n.d.). 2024 Payment Security Report. Retrieved March 24, 2025, from https://www.verizon.com/business/reports/payment-security-report/
VikingCloud. (n.d.-a). Cybersecurity statistics. Retrieved March 24, 2025, from https://www.vikingcloud.com/blog/cybersecurity-statistics
VikingCloud. (n.d.-b). PCI compliance for small businesses. Retrieved March 24, 2025, from https://www.vikingcloud.com/compliance-risk/pci-compliance-for-small-businesses
VikingCloud. (n.d.-c). Secure payment solution. Retrieved March 24, 2025, from https://www.vikingcloud.com/compliance-risk/secure-payment-solution
VikingCloud. (n.d.-d). PCI compliance overview. Retrieved March 24, 2025, from https://www.vikingcloud.com/compliance-risk/pci-compliance
VikingCloud. (n.d.-e). Vulnerability scanning. Retrieved March 24, 2025, from https://www.vikingcloud.com/cybersecurity/vulnerability-scanning
VikingCloud. (n.d.-f). How does taking credit cards by phone work with PCI? Retrieved March 24, 2025, from https://www.vikingcloud.com/blog/how-does-taking-credit-cards-by-phone-work-with-pci
VikingCloud. (n.d.-g). PCI SAQ 3.1 e-commerce options explained. Retrieved March 24, 2025, from https://www.vikingcloud.com/blog/pci-saq-3-1-e-commerce-options-explained
VikingCloud. (n.d.-h). What is a PCI QSA? Retrieved March 24, 2025, from https://www.vikingcloud.com/blog/what-is-a-pci-qsa
VikingCloud. (n.d.-i). Merchant, service provider, or both? Retrieved March 24, 2025, from https://www.vikingcloud.com/blog/merchant-service-provider-or-both
VikingCloud. (n.d.-j). PCI compliance and the service provider. Retrieved March 24, 2025, from https://www.vikingcloud.com/blog/pci-compliance-and-the-service-provider
Electronic Transactions Association. (2023). Judge approves credit card swipe fee settlement. Retrieved March 24, 2025, from https://electran.org/eta-insight-judge-approves-credit-card-swipe-fee-settlement-2/
Get started with a VikingCloud cybersecurity and compliance assessment with our cybersecurity experts.
.avif)
