Any business that stores, processes, or transmits cardholder data. This includes e-commerce companies, payment processors, fintech startups, SaaS platforms with billing integrations, point-of-sale vendors, and any organization accepting credit card payments. PCI DSS v4.0 took effect in March 2024 with new requirements for all entities by March 2025.
PCI DSS is a set of security standards that apply to any organization handling credit card data. Created in 2004 by the major card brands (Visa, Mastercard, American Express, Discover, JCB), it's maintained by the PCI Security Standards Council. The standard exists because card fraud costs the industry billions annually, and the card brands decided that every company in the payment chain needed minimum security standards.
If your business stores, processes, or transmits cardholder data, PCI DSS applies to you. There's no opt-out. The current version is PCI DSS v4.0.1, which replaced v3.2.1. All organizations were required to comply with v4.0 by March 31, 2024, and the remaining "future-dated" requirements in v4.0.1 became mandatory on March 31, 2025.
PCI DSS applies more broadly than most companies realize:
A common misconception: "We use Stripe, so we don't need PCI compliance." Wrong. Using a third-party processor reduces your scope significantly (you might qualify for the simplest self-assessment questionnaire), but you still need to validate compliance. You're responsible for how your website handles the card entry form, how you secure your account with the processor, and how you manage access to your payment dashboard.
PCI DSS groups merchants into four levels based on transaction volume per year:
Service providers have a separate two-level system: Level 1 (over 300,000 transactions) requires a QSA assessment; Level 2 can self-assess.
The SAQ comes in several versions (A, A-EP, B, B-IP, C, C-VT, D, P2PE) depending on how you handle card data. Picking the right SAQ is one of the first and most important decisions in the compliance process.
PCI DSS v4.0 organizes its requirements into 6 goals and 12 requirements:
Build and Maintain a Secure Network and Systems
Protect Account Data
Maintain a Vulnerability Management Program
Implement Strong Access Control Measures
Regularly Monitor and Test Networks
Maintain an Information Security Policy
These 12 requirements expand into over 250 individual sub-requirements. The v4.0 update added significant new mandates, including targeted risk analyses for controls where flexibility is allowed, enhanced authentication requirements, and new e-commerce security controls like script management for payment pages.
The jump from v3.2.1 to v4.0 was the biggest PCI DSS update in a decade. Major changes:
Costs vary dramatically by merchant level and environment complexity:
The biggest cost driver is scope. Companies that architect their systems to minimize the cardholder data environment (using tokenization, hosted payment pages, and network segmentation) spend far less on compliance than those processing cards on their own infrastructure.
PCI DSS has over 250 sub-requirements, each needing evidence. Compliance automation platforms track your control status against the PCI DSS requirement map, pull evidence from cloud infrastructure and security tools, manage quarterly scan scheduling, and flag gaps before your annual assessment.
For companies also pursuing SOC 2 or ISO 27001, the control overlap is around 40-60%. Tools that map across multiple frameworks let you reuse evidence and avoid duplicating work. All 17 tools in our database support PCI DSS.
Thinking a payment processor eliminates PCI obligations. Stripe, Braintree, and Adyen reduce your scope, but they don't remove your compliance responsibility. You still need to complete an SAQ and may need quarterly scans.
Scoping mistakes. Either including too many systems (expensive and time-consuming) or missing systems that touch card data (which means those systems aren't actually protected). Get scoping right before doing anything else.
Ignoring the v4.0 changes. Companies that validated against v3.2.1 for years and assumed v4.0 was just a minor update are finding significant gaps, especially around MFA, script monitoring, and authenticated scanning.
Treating compliance as annual. PCI DSS requires continuous control operation. Quarterly scans, regular log reviews, and ongoing monitoring aren't things you do the week before your assessment. Auditors and acquirers are increasingly looking for evidence of year-round compliance.
Not segmenting the network. Without network segmentation, your entire network is in scope for PCI DSS. Proper segmentation reduces the CDE to just the systems that actually handle cards, which reduces cost, complexity, and risk.
| Platform | Starting Price | Best For | G2 Rating |
|---|---|---|---|
| Vanta | ~$10,000/yr | Compliance automation | 4.6 |
| Drata | ~$7,500/yr | Compliance automation | 4.8 |
| Secureframe | ~$7,500/yr | Compliance automation | 4.7 |
| Sprinto | ~$6,000/yr | Compliance automation | 4.8 |
| Thoropass | ~$8,700/yr | Compliance automation | 4.7 |
| Hyperproof | ~$12,000/yr | GRC platform | 4.5 |
| AuditBoard (Optro) | ~$30,000/yr | Audit management | 4.6 |
| Strike Graph | ~$9,000/yr | Compliance automation | 4.7 |
| Anecdotes | ~$20,000/yr | GRC platform | 4.8 |
| Tugboat Logic (OneTrust) | Contact sales | Compliance automation | 4.5 |
| Scytale | ~$7,500/yr | Compliance automation | 4.8 |
| Comp AI | ~$2,388/yr | Compliance automation | 4.7 |
| Scrut Automation | ~$15,000/yr | GRC platform | 4.9 |
| Oneleet | ~$12,000/yr | Mixed | 4.9 |
| Cypago | ~$60,000/yr | GRC platform | 4.5 |
| Apptega | ~$9,950/yr | GRC platform | 4.8 |
| Ostendio | ~$2,994/yr | GRC platform | 4.8 |