Skip to main content
PCI DSS Payment Card Industry Data Security Standard

PCI DSS v4.0.1

The global security standard for organizations that store, process, or transmit payment card data — maintained by the PCI Security Standards Council. Available on the Ultimate plan.

Mandatory security standard
for every card payment business

PCI DSS v4.0.1 (Payment Card Industry Data Security Standard) is a globally mandated security standard maintained by the PCI Security Standards Council (PCI SSC), founded by Visa, Mastercard, American Express, Discover, and JCB. It applies to any organisation that stores, processes, or transmits payment card data.

Version 4.0.1 — the current version since March 2024 — moves from a prescriptive compliance-once approach to a continuous security model. Organisations can now use a Customised Approach to demonstrate security intent rather than following prescriptive technical requirements.

Non-compliance can result in fines from card brands, increased transaction fees, card acceptance restrictions, and — in the event of a breach — financial liability for fraudulent transactions.

12 requirements
Across network, data, access, monitoring, and policy
6 key control objectives
Build & maintain, protect, maintain, monitor, test, maintain policy
v4.0.1 since March 2024
Replaces PCI DSS v3.2.1 (retired March 2024)
Card brand mandated
Required by Visa, Mastercard, Amex, Discover, JCB

All 12 PCI DSS requirements — what you must implement

1

Install and maintain network security controls

Firewalls, routers, and network segmentation protecting the cardholder data environment (CDE) from untrusted networks.

2

Apply secure configurations to all system components

Change vendor defaults, eliminate unnecessary functionality, and document system configuration standards for all CDE components.

3

Protect stored account data

Limit stored cardholder data. Render PAN unreadable (truncation, tokenisation, or encryption). Never store sensitive authentication data post-authorisation.

4

Protect cardholder data in transit

Use strong cryptography (TLS 1.2+) for all transmissions of cardholder data across open, public networks. No unencrypted PAN in messaging or email.

5

Protect all systems against malware

Anti-malware solutions on all systems. Regular scans, log generation, and protection from known malware types including ransomware.

6

Develop and maintain secure systems and software

Secure SDLC, vulnerability management, web application firewall (WAF), protection against OWASP Top 10 vulnerabilities in public-facing applications.

7

Restrict access to cardholder data by business need to know

Role-based access control. Access limited to the minimum necessary. Documented access policies and procedures.

8

Identify users and authenticate access to system components

Unique IDs for all users. MFA for all access to the CDE. Password policy and privileged access management requirements.

9

Restrict physical access to cardholder data

Physical access controls, video surveillance, visitor logs, and secure disposal of media containing cardholder data.

10

Log and monitor all access to network resources and cardholder data

Automated audit logs for all CDE access. Log protection and retention (minimum 12 months). Log review and alerting.

11

Test security of systems and networks regularly

Internal and external vulnerability scanning (quarterly). Annual penetration testing. Intrusion detection/prevention systems. File integrity monitoring.

12

Support information security with organisational policies and programs

Comprehensive information security policy. Risk assessment. Security awareness training. Incident response plan. Third-party risk management programme.

Which PCI DSS validation
level applies to you?

L1

Level 1

>6 million card transactions/year

Validation: Annual Report on Compliance (ROC) by Qualified Security Assessor (QSA) + quarterly network scan by ASV

Large merchants and payment processors

L2

Level 2

1–6 million card transactions/year

Validation: Annual Self-Assessment Questionnaire (SAQ) + quarterly network scan by ASV

Mid-size merchants

L3

Level 3

20,000–1 million e-commerce transactions/year

Validation: Annual SAQ + quarterly network scan by ASV

E-commerce merchants

L4

Level 4

<20,000 e-commerce or up to 1 million other card transactions/year

Validation: Annual SAQ (recommended) + quarterly network scan (recommended)

Small merchants

Reduce your PCI DSS scope
before you start compliance work

The most effective PCI DSS strategy is reducing the number of systems in scope. These techniques can eliminate most of your compliance burden.

Tokenisation

Replace PANs with tokens so card data never touches your systems. Dramatically reduces CDE scope.

Redirect to payment page

Redirect checkout to a PCI DSS-compliant payment gateway. Your servers never see raw card data.

Network segmentation

Isolate CDE systems from the rest of your network. Limits the number of systems in scope.

Point-to-point encryption (P2PE)

Encrypt card data from capture device to processor. Reduces merchant-side scope significantly.

Who needs PCI DSS compliance?

Any organisation that stores, processes, or transmits cardholder data — including e-commerce platforms, financial institutions, payment processors, SaaS companies accepting card payments, retail, hospitality, and healthcare billing systems.

E-commercePayment ProcessorsFintechRetailHospitalityHealthcare BillingSaaS (card payments)Financial Services

Multi-Framework Support

11 Compliance Frameworks Supported

From the minimum viable security baseline to enterprise-grade standards — coverage for every compliance requirement.

Community (Free) Premium Ultimate

Start managing PCI DSS compliance with Unicis

Track all 12 PCI DSS v4.0.1 requirements with automated GAP analysis and evidence collection. Available on the Ultimate plan.