Home Compliance PCI DSS

PCI DSS 4.0 Compliance Guide

The complete guide to Payment Card Industry Data Security Standard v4.0 — 12 requirements, merchant levels, SAQ types, and penalties explained for finance & fintech teams.

✓ Official PCI SSC Source PCI DSS v4.0 — Active Standard Updated March 2026

What Is PCI DSS?

✓ Verified Data Verified: PCI SSC official documentation

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements established by the PCI Security Standards Council (PCI SSC) — a consortium founded in 2006 by American Express, Discover, JCB International, Mastercard, and Visa Inc. (PCI SSC, 2006)

PCI DSS applies to every organization that stores, processes, or transmits cardholder data (CHD) or sensitive authentication data (SAD) — regardless of size, industry, or transaction volume. This includes merchants, payment processors, issuing banks, acquiring banks, and service providers.

PCI DSS 4.0 was released on March 31, 2022, and became the sole active version on March 31, 2024, when PCI DSS 3.2.1 officially retired. PCI DSS 4.0.1 (minor clarifications, no new requirements) followed in June 2024. (PCI SSC, March 2022)

12
Core Requirements
4
Merchant Levels
4.0.1
Current Version
2024
v3.2.1 Retired
$100K/mo
Max Fine / Month

The 12 PCI DSS Requirements

✓ Verified Data Direct from PCI DSS v4.0 standard

PCI DSS v4.0 organizes its security requirements into six control objectives and 12 top-level requirements. (PCI DSS v4.0, Section 1) as of March 2026

Req 1
Install & Maintain Network Security Controls
Firewalls, network segmentation, and access controls to protect the cardholder data environment (CDE).
Req 2
Apply Secure Configurations to All System Components
Eliminate vendor-supplied defaults; harden all servers, routers, and endpoints per industry best practice.
Req 3
Protect Stored Account Data
Encrypt or tokenize PANs; prohibit storage of sensitive authentication data (SAD) after authorization.
Req 4
Protect Cardholder Data in Transit
Use strong cryptography (TLS 1.2+) for all transmission of cardholder data over open, public networks.
Req 5
Protect All Systems Against Malware
Deploy anti-malware on all applicable systems; keep signatures current; prevent, detect, and address malware.
Req 6
Develop & Maintain Secure Systems & Software
Patch management, secure SDLC, web application firewalls (WAF), and protection against known vulnerabilities.
Req 7
Restrict Access to System Components & Cardholder Data
Implement least-privilege access; restrict access to only those with a legitimate business need.
Req 8
Identify Users & Authenticate Access to System Components
Unique IDs for each user; MFA for all non-console administrative access; strong password policies.
Req 9
Restrict Physical Access to Cardholder Data
Badge access, CCTV, visitor logs, and physical media controls for all facilities housing the CDE.
Req 10
Log & Monitor All Access to System Components & Cardholder Data
Automated audit logs, centralized log management, and time-synchronization across all CDE systems.
Req 11
Test Security of Systems & Networks Regularly
Quarterly external and internal vulnerability scans by ASV; annual penetration testing; intrusion detection.
Req 12
Support Information Security with Organizational Policies & Programs
Written security policy, annual risk assessment, vendor management program, incident response plan.

Merchant Levels & Compliance Validation

✓ Verified Data Verified: Visa/Mastercard published merchant level definitions

PCI DSS compliance level is determined by annual transaction volume processed through each card brand. (Visa Merchant Levels)

LevelVisa / Mastercard CriteriaValidation Requirement
Level 1Over 6 million card transactions/year OR any merchant that has suffered a breachAnnual Report on Compliance (ROC) by a QSA + quarterly network scans by ASV
Level 21 million – 6 million transactions/yearAnnual SAQ completed by merchant + quarterly network scans by ASV
Level 320,000 – 1 million e-commerce transactions/yearAnnual SAQ + quarterly network scans by ASV
Level 4Fewer than 20,000 e-commerce or up to 1 million other transactions/yearAnnual SAQ recommended + quarterly scans recommended

Note: Individual card brands (Visa, Mastercard, Amex, Discover) define their own merchant levels with slightly different thresholds. Verify your level with your acquiring bank.

Penalties for Non-Compliance

✓ Verified Data Fine ranges verified from card brand published materials
Violation TypePenalty / ConsequenceWho Pays
Non-compliance fines$5,000 – $100,000 per month (assessed to acquiring bank, passed to merchant)Merchant
Data breach — per compromised record$50 – $90 per record; forensic investigation costs $20K – $200KMerchant
Card replacement costs$3 – $10 per card reissued by card brandsMerchant
Loss of card acceptanceTermination of ability to accept Visa/Mastercard/Amex paymentsMerchant
Increased transaction fees0.5% – 1.0% surcharge per transaction post-breach until re-certificationMerchant

Key Changes in PCI DSS 4.0

✓ Verified Data PCI SSC v4.0 Summary of Changes document

PCI DSS 4.0 introduced significant changes from 3.2.1, with new requirements phased in through March 31, 2025. (PCI SSC Summary of Changes)

PCI DSS Compliance Checklist

~ AI-Estimated AI-summarized from PCI DSS v4.0 requirement structure
This checklist summarizes key action items from PCI DSS v4.0. It is not a substitute for a full QSA assessment. Your applicable requirements depend on your merchant level and card-on-file scope.

Frequently Asked Questions

Do I need PCI DSS compliance if I use a payment processor like Stripe or Square?
Yes, but your scope is significantly reduced. If you use an iframe or redirect that prevents your systems from ever touching raw card data ("outsourced card environment"), you likely qualify for the simplest SAQ (A or A-EP). However, you are still responsible for your own systems' security and must complete annual self-assessment. Consult your acquiring bank.
What is a SAQ and which one do I need?
A Self-Assessment Questionnaire (SAQ) is a validation tool for merchants who are not required to undergo a full QSA audit. There are 9 SAQ types (A, A-EP, B, B-IP, C, C-VT, D-Merchant, D-Service Provider, P2PE). The correct SAQ depends on how you accept card payments. Most e-commerce merchants using fully hosted payment pages qualify for SAQ A.
What is tokenization and does it reduce PCI scope?
Tokenization replaces actual card numbers (PANs) with a non-sensitive placeholder token. When properly implemented with a validated tokenization system, it can dramatically reduce your PCI scope because systems storing only tokens — not actual PANs — may fall outside CDE scope. Verify scope reduction with your QSA.
What is the difference between PCI DSS 4.0 and 4.0.1?
PCI DSS 4.0.1 (released June 2024) consists only of editorial corrections, clarifications, and minor errata from the original v4.0. No new requirements were added, and no compliance timelines changed. If you are already compliant with v4.0, you are compliant with v4.0.1.
When do the new PCI DSS 4.0 'future-dated' requirements take effect?
The 64 new requirements that were marked as "best practice" during transition became mandatory on March 31, 2025. These include MFA for all CDE access, enhanced anti-phishing controls for e-commerce pages, targeted risk analysis, and new password length requirements.

Related Compliance Topics

Stay ahead of compliance requirements

Get weekly financial regulatory updates, market intelligence, and compliance insights — free.

⚖️
Need deeper legal & compliance resources?
Contract templates, legal guides, compliance frameworks, and regulatory intelligence — on LegalStackHub.
LegalStackHub →
📈 THE FINANCE STACK

Get your weekly market edge. Free.

Market pulse, stock spotlights, and actionable frameworks — delivered every week.

No spam · Unsubscribe anytime · View all issues →