Compliance

PCI-DSS Basics: What Every E-commerce Business Must Know

Accept credit cards online? PCI-DSS compliance is mandatory. Learn the requirements, how to achieve compliance, and avoid common mistakes that put your business at risk.

SimplCyber TeamApril 1, 202518 min read

Why E-commerce Businesses Must Care About PCI-DSS

Payment card fraud losses exceeded $35 billion globally in 2025, with e-commerce fraud increasing 20% year-over-year. If your business accepts credit cards, PCI-DSS compliance isn't optional—it's mandatory.

As of March 2025, PCI DSS 4.0 is now the required standard for all merchants. Non-compliance can result in fines up to $100,000 per month, plus liability for fraud losses. The average breach cost for retail businesses reached $3.48 million in 2025.

Understanding PCI-DSS

What is PCI-DSS?

The Payment Card Industry Data Security Standard is a set of security requirements designed to protect cardholder data. It was created by major credit card brands and is managed by the PCI Security Standards Council.

PCI DSS 4.0, mandatory since March 2025, introduced enhanced authentication requirements and stricter controls for cloud environments. The standard applies to all organizations that accept, process, store, or transmit payment card information.

Who Must Comply?

Any business that accepts credit cards must comply, regardless of size or transaction volume. This includes both merchants and service providers who handle cardholder data on behalf of others.

Research shows that 46% of small businesses experienced a cyberattack in 2025. You must comply even if you never see card numbers directly—your compliance scope may be reduced, but requirements still apply.

What is Cardholder Data?

Primary Account Number (PAN)

The credit card number is the main target of PCI-DSS protection. It must be rendered unreadable wherever stored through encryption, truncation, hashing, or tokenization.

Cardholder Name

The name as it appears on the card must be protected. Combined with the PAN, this data can be used for fraudulent transactions.

Expiration Date and Service Code

The card expiry date and three-digit service code on the magnetic stripe are part of cardholder data. These elements require protection when stored.

Sensitive Authentication Data

CVV/CVC codes, full magnetic stripe data, and PIN blocks must NEVER be stored after transaction authorization. Storage of this data is an automatic PCI-DSS violation regardless of encryption.

PCI-DSS Compliance Levels

Compliance requirements vary based on annual transaction volume. Most small e-commerce businesses fall into Level 3 or 4.

Level 1: 6+ Million Transactions Annually

Level 1 merchants require an annual on-site security assessment by a Qualified Security Assessor (QSA). They must also complete quarterly network scans by an Approved Scanning Vendor and submit an Attestation of Compliance.

Level 2: 1-6 Million Transactions Annually

Level 2 merchants must complete an annual Self-Assessment Questionnaire (SAQ) and quarterly ASV scans. They submit an Attestation of Compliance to their acquiring bank.

Level 3: 20,000-1 Million E-commerce Transactions Annually

Level 3 merchants complete an annual SAQ and quarterly ASV scans. Specific validation requirements are set by the acquiring bank.

Level 4: Fewer than 20,000 E-commerce Transactions Annually

Level 4 merchants may be required to complete an annual SAQ and quarterly scans, depending on their acquiring bank's policies. Check with your payment processor for specific requirements.

The 12 PCI-DSS Requirements

PCI-DSS has 12 main requirements organized into 6 control objectives. Understanding these requirements helps you implement appropriate security controls.

Goal 1: Build and Maintain a Secure Network

Requirement 1: Install and Maintain Network Security Controls

Deploy firewalls at network perimeters to protect cardholder data. Restrict inbound and outbound traffic to only necessary connections.

Prohibit direct public access to cardholder data environments. All access must route through controlled security checkpoints.

Requirement 2: Apply Secure Configurations

Change all vendor-supplied default passwords before deploying systems. Remove unnecessary default accounts that could provide unauthorized access.

Disable unnecessary services, protocols, and features. Each active service increases your attack surface and compliance scope.

Goal 2: Protect Cardholder Data

Requirement 3: Protect Stored Account Data

Minimize data retention by only storing what's absolutely necessary for business operations. Don't store sensitive authentication data after authorization under any circumstances.

Render PAN unreadable wherever stored through encryption, truncation, tokenization, or hashing. Use industry-accepted algorithms and strong cryptographic keys.

Requirement 4: Protect Cardholder Data with Strong Cryptography

Use strong encryption (TLS 1.2 or higher) for cardholder data transmission over open, public networks. Never send unencrypted PANs via email, messaging, or other insecure channels.

Encrypt data in transit over wireless networks. Wireless access points within the cardholder data environment require additional security controls.

Goal 3: Maintain a Vulnerability Management Program

Requirement 5: Protect All Systems from Malware

Deploy anti-malware solutions on all systems commonly affected by malicious software. Keep anti-malware current, actively running, and generating audit logs.

Review anti-malware logs regularly to identify potential security incidents. Under PCI DSS 4.0, this includes protection for all system components.

Requirement 6: Develop and Maintain Secure Systems

Apply critical security patches within one month of release. Develop all applications based on secure coding guidelines and industry best practices.

Review custom code for common vulnerabilities before production deployment. Maintain separate development, test, and production environments.

Goal 4: Implement Strong Access Control Measures

Requirement 7: Restrict Access by Business Need to Know

Limit access to cardholder data to the minimum necessary for each job function. Implement role-based access control (RBAC) with default deny-all policies.

Document all access privileges and review them at least every six months. Remove access immediately when employees change roles or leave.

Requirement 8: Identify Users and Authenticate Access

Assign a unique ID to each person with computer access to cardholder data environments. Implement multi-factor authentication for all access to the cardholder data environment.

Require strong passwords with minimum length, complexity, rotation, and history requirements. Under PCI DSS 4.0, password requirements have been strengthened.

Requirement 9: Restrict Physical Access

Use facility entry controls such as badges, locks, and security guards. Distinguish between visitors and employees with visual identification.

Secure all media containing cardholder data in locked facilities. Destroy media when no longer needed using secure methods.

Goal 5: Regularly Monitor and Test Networks

Requirement 10: Log and Monitor All Access

Log all access to cardholder data and system components. Record administrative actions, failed access attempts, and changes to authentication credentials.

Review logs daily for suspicious activity. Retain audit logs for at least one year, with three months immediately available for analysis.

Requirement 11: Test Security Systems Regularly

Conduct quarterly internal and external vulnerability scans using approved scanning vendors. Perform penetration testing at least annually and after significant infrastructure changes.

Deploy file-integrity monitoring on critical systems to detect unauthorized changes. Test wireless access points quarterly to identify rogue devices.

Goal 6: Maintain an Information Security Policy

Requirement 12: Support Information Security with Policies

Establish, publish, and maintain information security policies covering all personnel. Conduct annual risk assessments to identify threats and vulnerabilities.

Implement security awareness training for all personnel upon hire and annually. Define incident response procedures and test them regularly.

Reducing PCI-DSS Scope: The Smart Approach

The most effective compliance strategy is minimizing or eliminating your direct handling of cardholder data. This reduces both compliance costs and breach risk.

Payment Integration Methods

Storing Card Data

Maximum PCI scope requiring full compliance across your entire infrastructure. Extremely expensive and complex, potentially costing $50,000+ annually for small businesses.

Passing Through Your Systems

Medium PCI scope where cards process through your server before reaching the payment processor. Your server and network must be PCI compliant, requiring SAQ D and potentially a QSA assessment.

Hosted Payment Page (Redirect)

Minimal PCI scope where customers redirect to the payment processor's secure page. You never touch card data, qualifying for the simplest compliance path (SAQ A with only 22 requirements).

Embedded Payment Form (iFrame/JavaScript)

Very minimal PCI scope where the payment form embeds on your site but is hosted by the processor. Card data goes directly to the processor, qualifying for SAQ A-EP with 163 requirements.

Point-to-Point Encryption (P2PE)

Card data encrypts at the point of capture and decrypts only at the payment processor. You never access unencrypted card data, qualifying for SAQ P2PE-HW.

For small e-commerce businesses, hosted payment pages or embedded forms provide the best balance of user experience and compliance simplicity.

Self-Assessment Questionnaires (SAQ)

SAQs are compliance validation tools for merchants who don't require full on-site assessments by a QSA. Choose the correct SAQ type based on your payment integration method.

SAQ A: Fully Outsourced Payment Processing

Who This Applies To

E-commerce merchants who fully outsource payment processing by redirecting customers to third-party payment pages. The merchant's website doesn't receive, process, or store cardholder data.

Requirements

Only 22 requirements to validate, making this the simplest compliance path. Focus is on maintaining a secure website environment and proper vendor management.

SAQ A-EP: Partially Outsourced Payment Processing

Who This Applies To

E-commerce merchants using embedded payment forms (iFrame or JavaScript) hosted by the payment processor. The form appears on your site but card data transmits directly to the processor.

Requirements

163 requirements to validate including web application security, vulnerability management, and access controls. Better user experience than redirect methods while maintaining reduced scope.

SAQ D: All Other Merchants

Who This Applies To

All merchants and service providers not qualifying for other SAQ types. Required when you handle, process, or store cardholder data directly.

Requirements

All 12 PCI-DSS requirements apply with full validation required. This is the most complex assessment, typically requiring professional assistance to complete.

Completing Your SAQ

Determine the correct SAQ type based on how your payment integration handles cardholder data. Download the SAQ from the PCI SSC website or obtain it from your payment processor.

Answer all questions honestly about your security practices and controls. For any "No" answers, implement the necessary controls before completing validation.

Submit your completed SAQ and Attestation of Compliance to your payment processor or acquiring bank. Schedule quarterly ASV scans if required for your SAQ type.

Quarterly Vulnerability Scans

Most merchants must conduct quarterly vulnerability scans by an Approved Scanning Vendor (ASV). These scans identify security weaknesses in internet-facing systems.

What ASV Scans Detect

Scans identify known vulnerabilities, PCI-DSS compliance issues, and misconfigurations in your systems. They test for weak SSL/TLS configurations, unnecessary open ports, and missing security headers.

ASV scans provide remediation guidance for each finding. You must achieve a passing scan to maintain PCI compliance.

Common Scan Failures

Outdated software with known vulnerabilities is the most common scan failure. Weak SSL/TLS configurations and the presence of SSL 3.0 or TLS 1.0 will fail scans.

Unnecessary open ports, missing security headers, and default configurations trigger failures. All failures must be remediated and rescanned until achieving a passing result.

ASV Scan Process

Select an Approved Scanning Vendor—many payment processors offer this service included with merchant accounts. Schedule scans quarterly (every 90 days) and after significant infrastructure changes.

Remediate all failures by fixing identified vulnerabilities. Rescan until achieving a passing result, then submit passing scan reports to your payment processor or acquiring bank.

PCI-DSS Compliance Implementation

Follow these implementation steps based on your chosen payment integration method. Most small e-commerce businesses should target SAQ A or SAQ A-EP compliance.

For E-commerce Using Hosted Payment Pages (SAQ A)

Step 1: Choose a Compliant Payment Processor

Select a PCI-DSS Level 1 certified payment processor such as Stripe, PayPal, Square, or Authorize.net. Verify they provide hosted payment page options and will sign responsibility agreements.

Step 2: Implement Payment Page Redirect

Configure your checkout process to redirect customers to the processor's hosted payment page. Ensure no card data touches your website, servers, or databases at any point.

Step 3: Secure Your Website

Implement HTTPS (TLS 1.2 or higher) for your entire site, not just checkout pages. Keep your CMS, e-commerce platform, and all plugins updated with security patches.

Use strong passwords and multi-factor authentication for all administrative accounts. Implement regular backups and test restoration procedures.

Step 4: Complete SAQ A

Answer all 22 questions about your payment handling and security practices. Sign the Attestation of Compliance affirming your answers are accurate.

Submit the completed SAQ and AOC to your payment processor or acquiring bank. Maintain documentation supporting your SAQ responses.

Step 5: Annual Revalidation

Complete SAQ A annually and whenever your payment processing setup changes. Submit updated Attestations of Compliance to maintain your merchant account in good standing.

For E-commerce Using Embedded Forms (SAQ A-EP)

Complete all SAQ A steps listed above, plus implement these additional security requirements for the increased scope.

Additional Security Requirements

Isolate your payment page on a separate server or subdomain from the rest of your website. Implement a web application firewall (WAF) to protect against common attacks.

Conduct regular vulnerability scans of your payment page environment. Follow secure coding practices and implement change control procedures.

Additional Validation

Complete the longer SAQ A-EP questionnaire with 163 requirements. Conduct quarterly ASV scans of your payment page infrastructure.

Document all security controls including network diagrams, data flow diagrams, and security policies. Maintain records of vulnerability scans and remediation activities.

Common PCI-DSS Mistakes

Avoid these common mistakes that lead to non-compliance, fines, or data breaches. Each represents a serious security and compliance risk.

Mistake 1: Storing CVV/CVC Codes

The Problem

PCI-DSS absolutely prohibits storing CVV/CVC codes after transaction authorization, even if encrypted. Many e-commerce platforms and custom systems make this mistake.

The Consequence

Automatic non-compliance regardless of other security controls. Increased fraud liability and potential fines if discovered. Higher fraud rates if the data is breached.

The Solution

Configure all payment systems to discard CVV/CVC immediately after authorization. Regularly audit databases and logs to ensure no CVV storage occurs.

Mistake 2: Sending Card Data via Email

The Problem

Email is fundamentally insecure and should never transmit credit card information. This includes order confirmations, customer service communications, and internal messages.

The Consequence

Direct PCI-DSS violation creating significant data breach risk. Email systems often retain messages indefinitely, expanding your breach exposure.

The Solution

Use secure payment forms, customer portals, or PCI-compliant systems for all payment information. Train all staff never to request or accept card data via email.

Mistake 3: Storing Unnecessary Card Data

The Problem

Retaining full card numbers when only the last 4 digits are needed for customer reference. This dramatically expands compliance scope and breach risk.

The Consequence

Increased compliance costs, complexity, and potential breach liability. Every unnecessary instance of stored card data creates additional vulnerability.

The Solution

Implement tokenization to replace card numbers with non-sensitive tokens. Store only the last 4 digits for customer reference and transaction lookup.

Mistake 4: Ignoring Third-Party Compliance

The Problem

Assuming your payment processor's PCI compliance completely covers your obligations. Many merchants believe they have "no compliance" when using third-party processors.

The Consequence

You remain responsible for your portion of the payment environment. Breaches of your website can still compromise payment data and trigger liability.

The Solution

Complete your appropriate SAQ even when using third-party processors. Validate that third parties are PCI compliant and obtain their Attestations of Compliance.

Mistake 5: Outdated Software

The Problem

Running e-commerce platforms, plugins, or server software with known security vulnerabilities. This is one of the leading causes of e-commerce breaches.

The Consequence

Guaranteed ASV scan failures and potential breach exposure. PCI DSS 4.0 requires patching critical vulnerabilities within 30 days.

The Solution

Implement automated patch management and security update monitoring. Test and deploy security patches within the required timeframes.

Mistake 6: Weak Passwords and No MFA

The Problem

Administrative accounts protected only by passwords without multi-factor authentication. This violates PCI DSS 4.0 requirements for cardholder data environment access.

The Consequence

Unauthorized access to systems that could lead to data breaches. Automatic compliance failure during assessments.

The Solution

Implement multi-factor authentication for all administrative access to cardholder data environments. Use authenticator apps or hardware tokens rather than SMS-based MFA.

Mistake 7: Missing or Incomplete SAQ

The Problem

Not completing annual SAQ validation or answering questions dishonestly to avoid implementing required controls. Some merchants ignore SAQ requirements entirely.

The Consequence

Non-compliance status with potential merchant account suspension. Dramatically increased fines and liability if a breach occurs.

The Solution

Complete your SAQ accurately and honestly every year. Implement controls to address any gaps before signing your Attestation of Compliance.

PCI-DSS and Data Breaches

Understanding breach consequences and prevention is critical given the $3.48 million average retail breach cost in 2025.

If You Experience a Breach

Immediate Actions Required

Contain the breach by isolating affected systems and stopping ongoing data theft. Notify your payment processor and acquiring bank immediately—this is typically a contractual requirement.

Engage a PCI Forensic Investigator (PFI) to investigate the breach and prepare required reports. Preserve all evidence and logs for forensic analysis.

Financial Consequences

Forensic investigation costs range from $20,000 to $100,000 or more. Card reissuance fees typically run $5-10 per compromised card.

Add fraud losses, PCI non-compliance fines ($5,000-100,000+ per month), legal costs, and reputation damage. The total cost often exceeds $1 million for small businesses.

Compliance Consequences

Elevation to higher validation levels requiring more frequent and expensive assessments. Mandatory monthly external vulnerability scans and potentially quarterly penetration tests.

Some breached merchants lose the ability to accept credit cards entirely. Recovery to normal compliance status can take years.

Breach Prevention

Minimize cardholder data storage to reduce breach impact and compliance scope. Implement tokenization to replace sensitive card data with non-sensitive tokens.

Encrypt all cardholder data at rest and in transit using strong cryptography. Implement strong access controls with role-based permissions and multi-factor authentication.

Monitor and log all access to cardholder data environments with daily log review. Conduct regular vulnerability assessments and penetration testing.

Maintain and regularly test an incident response plan. Train all employees on security awareness and breach response procedures.

Payment Processor Selection

Choosing the right payment processor significantly impacts your compliance burden, security, and costs.

PCI Compliance Evaluation

Certification Level

Verify the processor is PCI-DSS Level 1 certified—the highest compliance level. Request their current Attestation of Compliance and ensure it's valid.

Responsibility Agreements

Determine what SAQ type you'll need to complete when using their services. Ensure they'll sign responsibility agreements delineating which PCI requirements they handle.

Security Features

Tokenization and Fraud Prevention

Confirm tokenization is included to replace card data with secure tokens. Evaluate fraud detection capabilities, velocity checking, and AVS/CVV validation.

Verify support for 3D Secure 2.0 (SCA compliance for European customers). Check what PCI compliance tools and resources they provide to merchants.

Integration Options

Payment Page Types

Assess hosted payment page options for SAQ A compliance. Evaluate embedded form solutions (iFrame/JavaScript) for SAQ A-EP compliance.

Review API capabilities if you need custom integration or have complex requirements. Check platform-specific integrations for Shopify, WooCommerce, Magento, etc.

Support and Documentation

Compliance Guidance

Evaluate the quality of PCI compliance guidance and resources provided. Assess technical support availability, response times, and expertise.

Review documentation quality for integration and troubleshooting. Check for active developer community and regularly updated SDKs.

Cost Structure

Fee Transparency

Compare transaction fees (percentage + fixed amount per transaction). Review monthly fees, minimum processing requirements, and setup costs.

Check costs for PCI compliance tools, ASV scans, and SAQ assistance. Understand chargeback fees and dispute resolution costs.

Recommended Processors for Small E-commerce

Stripe

Excellent developer experience with comprehensive documentation and modern APIs. Strong security and compliance tools with automatic PCI compliance assistance.

Transparent pricing with no monthly fees for standard accounts. Both hosted checkout (SAQ A) and embedded form (SAQ A-EP) options available.

Square

Simple setup process ideal for small businesses without technical expertise. Unified platform for online and in-person payments with consistent reporting.

No monthly fees with straightforward per-transaction pricing. Good option for businesses starting with basic needs.

PayPal

Widely recognized brand that customers trust, potentially reducing cart abandonment. Simple integration options including hosted and embedded payments.

Built-in fraud protection and dispute resolution. Higher transaction fees than some competitors but strong brand recognition.

Authorize.net

Established provider with 25+ years in the payment processing industry. Comprehensive features supporting complex payment scenarios and recurring billing.

Strong customer support and extensive integration options. Higher monthly fees but robust feature set for growing businesses.

Key Takeaways

PCI-DSS compliance is mandatory for all e-commerce businesses accepting credit cards. With payment fraud exceeding $35 billion in 2025 and e-commerce fraud up 20%, security is critical.

PCI DSS 4.0 became mandatory in March 2025 with enhanced requirements. The average retail breach now costs $3.48 million, making prevention essential.

Minimize compliance scope by using hosted payment pages or embedded forms. SAQ A and SAQ A-EP provide the simplest paths for small businesses.

Never store CVV codes, avoid handling raw card data, and use tokenization. Complete your annual SAQ honestly and maintain quarterly scans.

Choose PCI Level 1 certified payment processors and verify their compliance. Implement multi-factor authentication and keep all software updated.

Protect Your E-commerce Business

PCI-DSS compliance protects both your customers and your business from the devastating costs of payment card breaches. Choose the right payment integration method from the start to minimize compliance complexity.

For most small e-commerce businesses, outsourcing payment handling to certified processors provides the best security at the lowest cost. Investing in proper payment security now prevents far larger costs from breaches, fines, and reputation damage.

Ready to ensure your e-commerce business is secure and compliant? Get your free security assessment to identify vulnerabilities before they become breaches.

Tags:PCI-DSSe-commercepayment securitycompliancecredit cards

Related Articles

Protect your business today

Get a comprehensive security assessment and actionable remediation plan.

Get Your Free Risk Scan