PCI DSS9 min read

PCI DSS Compliance Checklist

This checklist provides a practical, actionable guide to achieving PCI DSS compliance. It's organized by the 12 PCI DSS requirements with specific tasks for each. The checklist is most relevant for organizations pursuing SAQ A-EP or SAQ D; if you're using hosted payment forms (SAQ A), your requirements are significantly reduced.

Use this as a planning tool to understand the scope of work and track your progress toward compliance.

Key Takeaways

Point Summary
Scope first Defining your cardholder data environment (CDE) is critical before implementing controls
Evidence-based You need documented evidence for every control
Ongoing process Compliance requires continuous maintenance, not just one-time implementation
Risk-based Focus on high-impact controls first
Right-size Match controls to your actual SAQ requirements

Phase 1: Scoping and Planning

Before implementing controls, you must understand what's in scope.

Define Your Cardholder Data Environment

  • Map data flows: Document how cardholder data enters, moves through, and exits your systems
  • Identify all systems: List every system that stores, processes, or transmits cardholder data
  • Identify connected systems: List systems connected to those handling cardholder data
  • Document third parties: List all service providers handling cardholder data on your behalf
  • Create network diagram: Visual representation of CDE and connected systems

Determine Your SAQ Type

  • Classify your role: Merchant, service provider, or both
  • Assess payment methods: How do you accept/process payments
  • Select SAQ type: A, A-EP, B, B-IP, C, C-VT, D (Merchant), or D (Service Provider)
  • Confirm with acquirer: Validate your level and SAQ type with your acquiring bank

Plan Scope Reduction (If Needed)

  • Evaluate tokenization: Can you replace stored PANs with tokens
  • Assess hosted payments: Can you move to hosted payment pages/iframes
  • Plan segmentation: Can you isolate CDE from other networks
  • Review service providers: Can you outsource more to PCI-compliant providers

Phase 2: Network Security (Requirements 1-2)

Requirement 1: Network Security Controls

Firewall and Routing:

  • Document and diagram all network connections to/from CDE
  • Implement firewall between CDE and untrusted networks
  • Configure deny-all, permit-by-exception rules
  • Restrict inbound traffic to only necessary ports
  • Restrict outbound traffic to business-justified destinations
  • Document business justification for each allowed connection

Firewall Management:

  • Establish firewall rule review process (at least every 6 months)
  • Document and approve all firewall rule changes
  • Identify and secure all wireless access points
  • Implement personal firewall on mobile devices accessing CDE

Requirement 2: Secure Configurations

System Hardening:

  • Develop configuration standards for all system types
  • Change all vendor-supplied defaults (passwords, SNMP strings, etc.)
  • Remove or disable unnecessary services and protocols
  • Configure one primary function per server (no mixed-use)
  • Document security parameters for each system type
  • Encrypt all non-console administrative access (SSH, HTTPS)

Inventory:

  • Maintain inventory of all system components in CDE
  • Document hardware and software versions
  • Establish process for updating inventory

Phase 3: Protect Account Data (Requirements 3-4)

Requirement 3: Protect Stored Data

Data Retention:

  • Document data retention policy
  • Implement processes to delete cardholder data when no longer needed
  • Quarterly process to identify and delete unnecessary stored data

Data Protection:

  • Never store sensitive authentication data (CVV, PIN, full track data) post-authorization
  • Mask PAN when displayed (first 6, last 4 maximum)
  • Render stored PAN unreadable using:
    • Strong one-way hashing
    • Truncation
    • Index tokens with secure lookup
    • Strong cryptography with key management
  • Document cryptographic key management procedures
  • Implement split knowledge for key management
  • Rotate encryption keys per defined schedule

Requirement 4: Protect Data in Transit

Transmission Security:

  • Use TLS 1.2 or higher for all cardholder data transmission
  • Verify TLS certificates are valid and trusted
  • Document all transmission points for cardholder data
  • Never send PAN via unprotected messaging (email, SMS, chat)
  • Implement certificate pinning where applicable

Phase 4: Vulnerability Management (Requirements 5-6)

Requirement 5: Malware Protection

Anti-Malware:

  • Deploy anti-malware on all systems commonly affected by malware
  • Ensure anti-malware is actively running and cannot be disabled
  • Configure automatic updates for anti-malware definitions
  • Generate and retain anti-malware logs
  • Document systems evaluated as not needing anti-malware (with risk assessment)

Anti-Phishing (v4.0):

  • Implement technical controls to detect and block phishing
  • Configure email filtering for malicious content
  • Train users on phishing awareness

Requirement 6: Secure Development and Systems

Patch Management:

  • Maintain inventory of all software
  • Subscribe to security vulnerability alerts
  • Apply critical patches within one month of release
  • Establish risk-based patching timeline for non-critical patches
  • Document patch testing procedures

Secure Development:

  • Train developers on secure coding practices
  • Follow secure coding guidelines (OWASP, etc.)
  • Review custom code for vulnerabilities before release
  • Separate development/test from production environments
  • Remove test data before production deployment
  • Remove development tools from production systems

Web Application Security:

  • Deploy Web Application Firewall (WAF) for public-facing apps
  • Configure WAF to block common attacks (SQL injection, XSS, etc.)
  • Or perform annual application security assessment
  • Address identified vulnerabilities

Change Management:

  • Document change control procedures
  • Separate duties for development and production deployment
  • Test all changes before production
  • Document rollback procedures
  • Approve all changes before implementation

Phase 5: Access Control (Requirements 7-9)

Requirement 7: Restrict Access by Need to Know

  • Define access control policy
  • Document roles and access privileges
  • Implement role-based access control (RBAC)
  • Grant access based on job function
  • Configure deny-all by default
  • Review access privileges at least every 6 months
  • Remove access promptly upon role change or termination

Requirement 8: Identify and Authenticate Users

User Management:

  • Assign unique ID to each user
  • Eliminate shared accounts
  • Manage privileged accounts separately
  • Control addition/deletion/modification of user IDs
  • Immediately revoke access for terminated users

Authentication:

  • Implement strong passwords OR multi-factor authentication
  • If passwords: minimum 12 characters, complexity requirements
  • Enforce password history (cannot reuse last 4)
  • Enforce password change every 90 days (if no MFA)
  • Lock accounts after 6 failed attempts
  • Set lockout duration to minimum 30 minutes

Multi-Factor Authentication:

  • Implement MFA for all administrative access to CDE
  • Implement MFA for all remote network access
  • MFA uses at least two different factors (something you know, have, or are)
  • MFA cannot be bypassed

System Accounts:

  • Document all system and application accounts
  • Secure service account credentials
  • Review system accounts periodically

Requirement 9: Physical Access

Facility Controls:

  • Implement physical access controls to CDE areas
  • Use badges or locks for secure areas
  • Monitor access points (cameras, guards, or access logs)
  • Escort visitors in secure areas
  • Identify visitors with visible badges
  • Maintain visitor logs (name, organization, date, time)

Media Security:

  • Classify media containing cardholder data
  • Secure media in locked storage
  • Control distribution of media
  • Track media when transported
  • Destroy media when no longer needed (cross-cut shred, degauss, etc.)

Point of Interaction (POI) Devices:

  • Maintain inventory of POI devices
  • Periodically inspect devices for tampering
  • Train personnel to detect tampering
  • Document device inspection procedures

Phase 6: Monitoring and Testing (Requirements 10-11)

Requirement 10: Logging and Monitoring

Audit Logging:

  • Implement logging on all CDE systems
  • Log user access to cardholder data
  • Log administrative actions
  • Log access to audit logs
  • Log invalid access attempts
  • Log changes to identification mechanisms
  • Log initialization/stopping of audit logs
  • Log creation/deletion of system objects

Log Details:

  • Include user identification in logs
  • Include event type
  • Include date and time
  • Include success/failure indication
  • Include origin of event
  • Include identity of affected resource

Log Management:

  • Synchronize all system clocks (NTP)
  • Secure audit trails against modification
  • Retain logs for at least one year
  • Keep at least 3 months immediately available
  • Implement daily log review process
  • Configure alerts for security events

Security Monitoring:

  • Implement file integrity monitoring on critical files
  • Configure alerts for unauthorized changes
  • Document response procedures for alerts

Requirement 11: Security Testing

Wireless Detection:

  • Inventory authorized wireless access points
  • Perform quarterly wireless scans or use wireless IDS
  • Investigate unauthorized wireless access points

Vulnerability Scanning:

  • Perform quarterly internal vulnerability scans
  • Perform quarterly external scans by Approved Scanning Vendor (ASV)
  • Rescan until passing results achieved
  • Address high and critical vulnerabilities
  • Scan after significant changes

Penetration Testing:

  • Perform annual penetration test
  • Test from both inside and outside the network
  • Include network-layer and application-layer testing
  • Test segmentation controls (if using segmentation)
  • Address findings and retest
  • Document methodology and results

Change Detection:

  • Implement mechanism to detect unauthorized changes to payment pages
  • Monitor HTTP headers and scripts on payment pages (v4.0 requirement)

Phase 7: Governance (Requirement 12)

Information Security Policy

  • Establish information security policy
  • Review policy annually
  • Assign responsibility for security program
  • Define security responsibilities for all personnel

Acceptable Use:

  • Document acceptable use policies for technology
  • Require acknowledgment from personnel
  • Address remote access, mobile devices, and removable media

Risk Assessment:

  • Perform formal risk assessment annually
  • Identify critical assets and threats
  • Evaluate vulnerabilities and likelihood
  • Document risk mitigation strategies
  • Perform targeted risk assessments as required

Personnel Security:

  • Screen personnel with access to CDE (background checks)
  • Train all personnel on security awareness annually
  • Train relevant personnel on PCI DSS requirements
  • Document training completion

Service Provider Management:

  • Maintain list of all service providers
  • Document services provided and responsibilities
  • Obtain written agreements acknowledging PCI DSS obligations
  • Review service provider compliance status annually
  • Monitor service provider compliance

Incident Response:

  • Create incident response plan
  • Define roles and responsibilities
  • Establish communication procedures
  • Include notification requirements (card brands, law enforcement)
  • Document containment and recovery procedures
  • Test incident response plan annually
  • Update plan based on lessons learned

Phase 8: Validation

Complete Self-Assessment

  • Gather all evidence of compliance
  • Complete appropriate SAQ
  • Sign and date attestation
  • Submit to acquiring bank (if required)

Ongoing Compliance

Quarterly:

  • External ASV vulnerability scans
  • Internal vulnerability scans
  • Wireless access point scans
  • Review and secure deletion of unnecessary data

Annually:

  • Complete SAQ or QSA assessment
  • Penetration testing
  • Risk assessment
  • Security awareness training
  • Policy reviews
  • Service provider compliance reviews
  • Access privilege reviews
  • Firewall rule reviews
  • Incident response plan testing

Frequently Asked Questions

How long does it take to become PCI DSS compliant?

For SAQ A: A few weeks with proper payment integration. For SAQ D: 3-6 months typically, depending on starting point and resources.

What's the minimum I need for SAQ A?

SAQ A covers approximately 27 questions (in v4.0) focused on: service provider management, physical security of payment devices (if any), policy documentation, and confirmation of proper integration with hosted payment forms.

Do I need a QSA for initial compliance?

Only Level 1 merchants and Level 1 service providers require a QSA assessment. Others can self-assess using the appropriate SAQ.


Need help navigating PCI DSS compliance for your organization? Talk to our team


Sources