Glossary

PCI DSS

The Payment Card Industry Data Security Standard, a set of requirements for organizations that handle credit card data.

Key Takeaways

  • PCI DSS is a set of 12 security requirements enforced by Visa, Mastercard, and other card brands on any organization that stores, processes, or transmits credit card data: compliance costs range from thousands to hundreds of thousands of dollars annually depending on payment processor volume.
  • Tokenization significantly reduces PCI scope by replacing card numbers with non-sensitive tokens, but it does not eliminate the compliance obligation entirely: merchants still need to validate against some subset of the standard.
  • Bitcoin and cryptocurrency payments fall completely outside PCI DSS scope because no cardholder data is involved: merchants accepting only crypto sidestep the entire compliance framework, its costs, and associated breach liability.

What Is PCI DSS?

PCI DSS (Payment Card Industry Data Security Standard) is a global security standard that defines how organizations must protect credit and debit card data. Any business that accepts, processes, stores, or transmits cardholder information is required to comply, regardless of size or transaction volume. The standard covers everything from network architecture and encryption to access controls and security monitoring.

The standard is maintained by the PCI Security Standards Council (PCI SSC), which was founded in 2006 by five major card brands: Visa, Mastercard, American Express, Discover, and JCB International. While the Council develops and publishes the standard, individual card brands enforce compliance through their relationships with acquiring banks. PCI DSS is not a law: it is a contractual requirement. If a merchant wants to accept card payments, compliance is mandatory under their merchant agreement.

The current version is PCI DSS v4.0.1, published in June 2024. It replaced v3.2.1 (retired March 2024) and introduced 64 new requirements, 51 of which became mandatory on March 31, 2025 after a transition period as best practices.

How It Works

PCI DSS organizes its security controls into 12 requirements grouped under six goals. Together, these requirements expand into over 300 sub-requirements that cover the full lifecycle of cardholder data protection.

The 12 Requirements

GoalRequirement
Build and maintain a secure network1. Install and maintain network security controls (firewalls, segmentation)
Build and maintain a secure network2. Apply secure configurations to all system components
Protect account data3. Protect stored account data (encryption, masking, hashing)
Protect account data4. Protect data with strong cryptography during transmission
Maintain a vulnerability management program5. Protect all systems from malicious software
Maintain a vulnerability management program6. Develop and maintain secure systems and software
Implement strong access controls7. Restrict access to cardholder data by business need-to-know
Implement strong access controls8. Identify users and authenticate access (unique IDs, MFA)
Implement strong access controls9. Restrict physical access to cardholder data
Regularly monitor and test networks10. Log and monitor all access to system components and cardholder data
Regularly monitor and test networks11. Test security of systems and networks regularly
Maintain an information security policy12. Support information security with organizational policies and programs

Compliance Levels

The card brands assign merchants to one of four compliance levels based on annual transaction volume. Higher levels require more rigorous validation:

LevelAnnual TransactionsValidationTypical Cost
Level 1Over 6 millionOn-site audit by Qualified Security Assessor (QSA), Report on Compliance (ROC)$50,000 to $200,000+
Level 21 to 6 millionSelf-Assessment Questionnaire (SAQ), possible internal audit$10,000 to $50,000
Level 320,000 to 1 millionSAQ, quarterly network scans by Approved Scanning Vendor (ASV)$1,000 to $10,000
Level 4Fewer than 20,000 e-commerceSAQ, quarterly ASV scans (varies by acquirer)$800 to $10,000

A data breach can automatically elevate a merchant to Level 1 regardless of transaction volume, triggering the most expensive validation requirements. Service providers have a separate two-tier system: Level 1 for those handling over 300,000 transactions annually, and Level 2 for those below that threshold.

Self-Assessment Questionnaires

Most merchants validate compliance through Self-Assessment Questionnaires (SAQs). The type of SAQ depends on how the merchant handles card data:

  • SAQ A: for merchants that fully outsource all payment processing to a third-party payment gateway; no card data touches the merchant's systems (approximately 31 questions)
  • SAQ A-EP: for e-commerce merchants that outsource processing but whose website controls how customers reach the payment page
  • SAQ C: for merchants with payment application systems connected to the internet but that do not store cardholder data (approximately 160 questions)
  • SAQ D: the most comprehensive questionnaire (approximately 250+ questions) for merchants that store cardholder data or do not fit other categories
  • SAQ P2PE: for merchants using PCI-listed Point-to-Point Encryption solutions, which significantly reduce the number of applicable controls

The Cost and Burden of PCI Compliance

PCI compliance is one of the most significant operational costs for merchants that accept card payments. Beyond the direct assessment fees, organizations must invest in infrastructure, staff training, security tooling, and ongoing monitoring.

Key cost components include:

  • Qualified Security Assessor audits: $35,000 to $200,000 for Level 1 merchants
  • Network security infrastructure (firewalls, segmentation, intrusion detection): $5,000 to $20,000
  • Data encryption and tokenization systems: $5,000 to $50,000
  • Security Information and Event Management (SIEM): $10,000 to $100,000
  • Quarterly vulnerability scans by Approved Scanning Vendors: up to $200 per IP address annually
  • Employee security training: $50 to $100 per employee
  • Ongoing maintenance and continuous monitoring: 10 to 15 percent of the annual compliance investment

Costs are rising under PCI DSS v4.0.1 due to new requirements for universal multi-factor authentication, targeted risk analysis, payment page script integrity monitoring, and more rigorous penetration testing. For a deeper look at traditional card network economics and the fees merchants face, see the card network economics research article.

Penalties for Non-Compliance

While PCI DSS is not a law, the contractual penalties are severe. Card brands fine acquiring banks, who pass those fines to merchants:

  • Monthly fines escalate from $5,000 to $10,000 in the first three months up to $50,000 to $100,000 per month after six months
  • Post-breach costs average $50 to $90 per compromised cardholder record
  • Acquiring banks may increase interchange fees or terminate the merchant relationship entirely
  • Non-compliance can be used as evidence of negligence in lawsuits following a data breach

How Tokenization Reduces PCI Scope

Tokenization is the most effective way to reduce PCI DSS scope without eliminating card acceptance. It works by replacing sensitive card data (like the Primary Account Number) with a randomly generated surrogate value called a token. The token has no mathematical relationship to the original card number and is useless if stolen.

Here is how a tokenized payment flow works:

  1. The customer enters card details directly into a payment form hosted by or connected to the tokenization provider
  2. The provider stores the real card number in a PCI-compliant token vault and returns a token to the merchant
  3. The merchant stores only the token for future reference, refunds, or recurring billing
  4. For subsequent transactions, the merchant sends the token to the provider, who maps it back to the real card number for processing
# Tokenized payment flow (simplified)

# Customer submits card data directly to payment gateway
POST /api/tokens
{
  "card_number": "4111111111111111",
  "expiry": "12/27",
  "cvv": "123"
}

# Gateway returns a token (merchant never sees the real PAN)
Response: { "token": "tok_xk9f3m2p7q4w8r1t" }

# Merchant stores only the token for future charges
POST /api/charges
{
  "token": "tok_xk9f3m2p7q4w8r1t",
  "amount": 4999,
  "currency": "usd"
}

Because the merchant's systems never touch real card data, most of their infrastructure falls outside PCI scope. This can reduce the applicable SAQ from the 250+ question SAQ D to the roughly 31 question SAQ A, cutting compliance costs dramatically. However, tokenization does not eliminate PCI obligations entirely: the merchant must still validate against the applicable SAQ, and the tokenization provider must maintain full PCI compliance for the token vault.

Why It Matters: Bitcoin Payments and PCI

PCI DSS applies specifically to payment card data: Primary Account Numbers, cardholder names, expiration dates, and service codes. It does not apply to payment methods that do not involve card networks.

This is where Bitcoin and cryptocurrency payments offer a fundamental advantage. When a merchant accepts Bitcoin directly, no cardholder data exists in the transaction. There are no card numbers to encrypt, no PANs to tokenize, no cardholder data environments to segment, and no SAQs to complete. The entire PCI DSS framework simply does not apply.

For merchants, this means:

  • Zero PCI compliance costs for Bitcoin transactions
  • No breach liability related to card data (because there is no card data)
  • No quarterly vulnerability scans or annual assessments for the crypto payment path
  • No risk of being elevated to Level 1 after a card data breach

Solutions like Spark enable fast, low-cost Bitcoin and stablecoin payments that settle in seconds without requiring merchants to handle any card data. By using a Bitcoin Layer 2 for payments, merchants can offer instant checkout experiences while completely avoiding the PCI compliance overhead that comes with traditional card acceptance. For a practical guide on accepting Bitcoin payments as a merchant, see the Bitcoin merchant payments guide.

There is an important caveat: if a business accepts both card and crypto payments, PCI DSS still applies to the card payment path. And if a crypto platform allows users to purchase cryptocurrency using credit or debit cards, the card-handling component remains in scope. The PCI exemption applies only to transactions where no card data is involved at any point.

Changes in PCI DSS v4.0.1

The latest version of the standard introduced several significant changes that became mandatory on March 31, 2025:

  • Multi-factor authentication is now required for all access to the Cardholder Data Environment, not just administrative or remote access
  • Organizations must perform targeted risk analysis to define their own security control frequencies rather than relying on fixed annual schedules
  • Minimum password length increased from 8 to 12 characters
  • Payment page script integrity monitoring is now mandatory, requiring merchants to inventory and authorize all scripts loaded in consumer browsers on payment pages (targeting e-skimming attacks). This relates to the security concerns addressed by 3D Secure authentication
  • Disk-level encryption no longer qualifies as encryption at rest for fixed media
  • A new "customized approach" allows organizations to implement alternative controls as long as they meet the stated security objective, with documented justification

Risks and Considerations

PCI DSS compliance is a continuous process, not a one-time certification. Organizations face several ongoing challenges:

  • Scope creep: new systems, integrations, or business processes can inadvertently bring additional infrastructure into PCI scope, increasing costs and audit complexity
  • Compliance does not equal security: meeting the minimum PCI requirements does not guarantee protection against all attack vectors. Many breached organizations were technically PCI-compliant at the time of the incident
  • Third-party risk: under v4.0.1, organizations face increased responsibility for monitoring vendor compliance, requiring contractual agreements and regular assessments of third-party security practices
  • Version transition burden: organizations must adapt to new requirements with each version update, and the transition from v3.2.1 to v4.0.1 required significant infrastructure and process changes
  • Cost trajectory: PCI compliance costs trend upward with each version as security requirements become more stringent, disproportionately affecting small and mid-size merchants

For businesses exploring alternatives to card-based payment acceptance, the dollar-denominated Bitcoin payments research article explains how stablecoin payments on Bitcoin rails can provide familiar dollar-denominated experiences without the PCI compliance overhead.

This glossary entry is for informational purposes only and does not constitute financial or investment advice. Always do your own research before using any protocol or technology.