We've raised a $25 million Series B.Learn more ->
HomeCustomersPricingDocsCareers
Log inTalk to an expert
Accepting Card Payments

Understanding PCI and working with card data

If you, or a third party on your behalf, touches cardholder data, you have compliance obligations. Those obligations are specifically related to the Payment Card Industry Data Security Standard (PCI DSS) requirements. The key to handling these requirements is understanding what applies to you, how to reduce that scope, and then how to comply with what remains. The goal is to meet compliance requirements while maintaining an excellent customer experience.

This article is the first part in a broader journey through collecting card data and remaining compliant. We’ll lay the groundwork in this article by covering:

  1. What PCI DSS is and how it applies to you
  2. The various levels and scopes of PCI DSS
  3. Attesting compliance
  4. Risks of non-compliance
  5. How compliance can impact your team
GetLost commentary

As you read, you’ll see callouts like this one that we’re going to use to provide commentary from a business’s point of view. This fake company is called GetLost, and they’re an online travel agency (OTA). They’re still in the “build phase” and don’t have a live product yet. They’re evaluating their options for collecting and using card data, and they know PCI DSS will apply to them in some way, but they don’t know to what extent yet. They want to understand their options for collecting and using card data, and the compliance implications of those options.

PCI DSS

The PCI Security Standards Council (PCI SSC) published PCI DSS in 2005. It’s a global security standard that applies to any entity that stores, processes, or transmits cardholder data (CHD). The standard was agreed upon between the major card brands to reduce the volume of fraud involving stolen cards.

Today, PCI DSS is mandated by six major card brands (Visa, Mastercard, JCB, AmEx, Discover, and Union Pay) and contractually enforced by acquiring banks. If you’re a merchant and have signed an acquiring contract with a bank since 2005, you’re likely contractually required to be PCI DSS compliant.

If you’re a service provider, PCI DSS applies to you too. Merchants often ask for an Attestation of Compliance (AoC), and you could possibly lose business if you don’t have it. Card brands manage compliance for service providers as well, and they often maintain publicly available lists that include each service provider’s type (e.g., payment facilitator, merchant servicer, etc.) and validation type (this is where PCI DSS is noted). You can also see how much longer a service provider’s validation will be active.

Complying with PCI DSS is essentially a pass-fail designation. You have to demonstrate that you meet the requirements that are in scope for you, and failing a single requirement or control results in an overall failure. While you can reduce your overall scope, there’s no middle ground or partial compliance for remaining requirements.

Account data is a core aspect of the PCI DSS requirements. Understanding it in more depth will help you make decisions later on, so let’s cover that first.

What is account data?

Account data has two subcategories: cardholder data (CHD) and sensitive authentication data (SAD).

Cardholder data
  • Primary account number (PAN)
  • Cardholder name
  • Expiration date
  • Service code
Sensitive authentication data
  • Full track data (magnetic-stripe data or equivalent on a chip)
  • Card verification code
  • PINs and PIN blocks

If you collect, process, or transmit this data, it brings your business into scope for PCI DSS requirements. And if you rely on a third party for managing any type of account data, you need to ensure the third party is compliant with PCI DSS. Exact requirements can vary depending on how account data is processed. For example, you might only collect the cardholder name and then use a third party to collect PANs. This would change which requirements apply to you, and which apply to the third party.

We’ll go into more detail on the requirements later, but for now, know that if you have systems that interact with account data, you’re in scope for PCI DSS in some way. To start narrowing down the impact, you need to know if your business is considered a merchant or a service provider.

GetLost commentary

We’ll of course need to interact with this data so we can charge customers, but we also have downstream partners that need card information. In those situations, we’ll need a way to securely forward card information to them. As for being a merchant or service provider, that’s something we’re still trying to understand.

Merchants and service providers

There are different assessments and requirements for merchants and service providers under PCI DSS. This includes transaction volume thresholds that can change your compliance obligations, so you need to figure out if your business qualifies as a merchant, a service provider, or both. The difference largely has to do with how you handle cardholder data. To start, ask yourself:

  1. Will my business store, process, or transmit cardholder data on behalf of other entities?
  2. Will my business sell goods or services and receive payments directly from credit cards?
  3. Could my business impact the security of cardholder data?
A flowchart to help you determine whether you are a merchant or service provider
Use this flowchart to help determine whether you are a service provider or merchant

If you plan to work with third parties to collect or process card data, you should find out from them as well whether they’re a service provider, and what their PCI level is.

With a better idea of which your business is, it may help to review PCI SSC’s definitions for merchants and service providers. We’ll share their definitions and then provide summaries to help clarify each term.


Merchants

For the purposes of the PCI DSS, a merchant is defined as any entity that accepts payment cards bearing the logos of any PCI SSC Participating Payment Brand as payment for goods and/or services.

A merchant that accepts payment cards as payment for goods and/or services can also be a service provider, if the services sold result in storing, processing, or transmitting cardholder data on behalf of other merchants or service providers. For example, an ISP is a merchant that accepts payment cards for monthly billing, but also is a service provider if it hosts merchants as customers.

Evervault's summary

Merchants are businesses that accept payment for goods and services they directly provide to customers, and typically have their own merchant ID (MID).

Examples: Online retailers that sell directly to customers

Service providers

Business entity that is not a payment brand, directly involved in the processing, storage, or transmission of cardholder data (CHD) and/or sensitive authentication data (SAD) on behalf of another entity. This includes payment gateways, payment service providers (PSPs), and independent sales organizations (ISOs). This also includes companies that provide services that control or could impact the security of CHD and/or SAD. Examples include managed service providers that provide managed firewalls, IDS, and other services as well as hosting providers and other entities.

Evervault's summary

Service providers are entities directly involved in the processing, storage, and transmission of cardholder data on behalf of another entity, or an entity that may impact the security of another in scope entity.

Examples: Stripe, Shopify, online travel agencies, cloud service providers

Being a merchant and a service provider

There are many businesses that qualify as both a merchant and service provider. Ecommerce platforms and payment facilitators are common examples. Users pay these businesses directly to use their platforms, giving those businesses a merchant designation. But these businesses also facilitate payments from customers on behalf of merchants, making them a service provider too. Businesses like these generally focus on complying with service provider requirements because they’re more comprehensive, and it covers them on the merchant side as well.

GetLost commentary

It looks like we’ll actually be both a merchant and a service provider. Travel booking can get pretty complex. There will be scenarios where we charge for the entire booking and pay out to partners separately, and other situations where we only charge for our services and our partners charge customers directly for their portion of the booking.

PCI DSS scoping

It’s time to go a little deeper on what’s in scope for PCI DSS. In straightforward terms:

  1. There are the infrastructure and organizational pieces that will be evaluated for compliance
  2. The compliance framework that defines goals, requirements, and controls for what’s being evaluated
  3. Reporting requirements that prove your compliance

What gets evaluated

At the broadest level, the cardholder data environment (CDE) and system components are under evaluation. The CDE is everything that goes into processing cardholder data, which includes system components, but also people and processes. This includes components that don’t process cardholder data but have unrestricted connectivity to ones that do. Additionally, any system components, people, or processes that could potentially impact the security of the CHD, are also in scope.

The PCI DSS requirements go into more detail on what system components are, but they include cloud infrastructure, cart management, network devices, code repositories, and more. You’ll need to do some internal research and mapping to define what your CDE and system components look like. This scoping and segmentation guide might be useful to have on hand while you start this process.

GetLost commentary

This has a potentially huge impact for us. We’ll have numerous microservices that run in the cloud that could be in scope. We’ll have to do more digging on systems that “could potentially impact the security of CHD”.

Understanding your CDE

Each CDE is unique but there are general actions you can take to figure out what parts are in scope. You can start by identifying the services your business provides that might involve cardholder data or have access to it. This might include:

  • Ecommerce (online checkout flows, cart functionality, subscription services, account management, etc.)
  • Card-present transaction services (point of sale systems, payment terminals, etc.)
  • Refund, fraud, and chargeback management services and workflows
  • Call center and other support services and teams

With that list, roughly map out how data flows between the systems, as well as the people and processes involved. It might help to show flows from the customer’s point of view, as well as from an internal perspective. When you have a general idea of what’s involved, you can engage with your engineering, IT, and security teams to identify the underlying infrastructure pieces that support those core business services, or that have access to them. This can at least get you started in determining the scale of what might be in scope.

GetLost commentary

Mapping our ecommerce flow first makes the most sense. It’ll have the highest throughput of transactions, and it’s the most vulnerable since it’s obviously available on the open internet. Our infrastructure is in AWS, primarily in US East 1 and EU West 1, with multiple availability zones (AZs). Our ecommerce model is fairly typical, with our primary API consuming card data directly from customer mobile apps and our web app. The high level flow looks like this (red arrows indicate cardholder data flows).

An infrastructure diagram

After mapping the data flow, it’s clear that our API is directly used for payment processing, as well as for providing customer facing and back office management. It’s all linked together and it looks looks like our entire AWS account infrastructure is in scope.

Our next step is to figure out what that means in terms of applying controls. Given the scope, we can already see this is going to be a pretty large and disruptive piece of work.

Understanding the requirements framework

There’s a tiered way to look at the framework. At the highest level are six goals. These are short but broad definitions of what the security standard achieves. Next are the 12 requirements that you need to meet (or descope from) to achieve the goals. At the lowest level, there are 300+ controls, which you put in place (or descope from) to meet the 12 requirements. We’ll cover the goals and requirements in more detail in a subsequent piece, but here they are for reference.

  1. Build and maintain a secure network
    1. Install and maintain a firewall configuration to protect cardholder
      data
    2. Do not use vendor-supplied defaults for system passwords and
      other security parameters
  2. Protect cardholder data
    1. Protect stored data
    2. Encrypt transmission of cardholder data across open, public networks
  3. Maintain a vulnerability management program
    1. Use and regularly update anti-virus software or programs
    2. Develop and maintain secure systems and applications
  4. Implement Strong Access Control Measures
    1. Restrict access to cardholder data by business need-to-know
    2. Assign a unique ID to each person with computer access
    3. Restrict physical access to cardholder data
  5. Regularly monitor and test networks
    1. Track and monitor all access to network resources and cardholder data
    2. Regularly test security systems and processes
  6. Maintain an information security policy
    1. Maintain a policy that addresses information security for all personnel

Not every business has to implement all 300+ controls. We’ve mentioned descoping a few times now, and what that means is that there are different approaches to handling CHD and building your CDE. How you compose those pieces, and whether you’re a merchant or a service provider (or both), will change the requirements for you.

Reporting requirements (attestation)

How you report on or attest to your compliance depends on whether you’re a merchant or service provider, as well as transaction volume thresholds. Before determining your assessment type, there are a few terms you need to know. Some of these may not apply to your business, but they help contextualize the table later in this section.

Attestation of Compliance (AoC)

This is a form that either you or an assessor fills out to attest to the results of a PCI DSS assessment.

Qualified Security Assessor (QSA)

This is an assessor that is qualified by the PCI SSC to validate an entity’s adherence to PCI DSS requirements.

Report on Compliance (RoC)

This is a reporting tool that’s used to document detailed results from an entity’s PCI DSS Level 1 assessment.

Self-assessment questionnaire (SAQ)

This is a questionnaire you fill out to attest to your compliance. There are a few different types of SAQs.

SAQ A

E-commerce merchants with fully outsourced payment processing

  • Complete redirection to third-party payment pages (PayPal, Stripe Checkout, etc.)
  • No electronic storage, processing, or transmission of cardholder data
  • No influence over payment transaction security
  • Key identifier: Zero merchant system interaction with payment data
SAQ A-EP

E-commerce merchants with partially outsourced payment processing

  • Direct connection between merchant website and payment processor
  • Merchant website influences payment transaction security (embedded forms, JavaScript)
  • No electronic storage, processing, or transmission of cardholder data
  • Key identifier: Merchant system affects payment security but doesn't handle card data
SAQ B

Card-present merchants using imprint machines or standalone dial-out terminals

  • Physical card imprints or standalone PTS-approved terminals with dial-out connection
  • No electronic storage, processing, or transmission of cardholder data
  • No connection to other merchant systems
  • Key identifier: Isolated physical payment devices with phone line connection
SAQ B-IP

Card-present merchants using standalone IP-connected terminals

  • PTS-approved payment terminals with IP connection to processor
  • No electronic storage, processing, or transmission of cardholder data
  • No connection to other merchant systems
  • Key identifier: Isolated IP-connected payment terminals
SAQ C-VT

Merchants using web-based virtual terminals

  • Browser-based payment processing applications
  • No electronic storage, processing, or transmission of cardholder data
  • Manual entry of payment data through secure web interface
  • Key identifier: Web-based manual payment entry systems
SAQ C

Merchants with connected payment applications

  • Payment applications connected to internet but not PA-DSS validated
  • No electronic storage, processing, or transmission of cardholder data
  • Systems integrated with other merchant applications
  • Key identifier: Connected payment systems without PA-DSS validation
SAQ D

All other merchants and all service providers

  • Any environment not fitting above categories
  • May include electronic storage, processing, or transmission of cardholder data
  • All service providers regardless of payment method
  • Key identifier: Complex environments, data storage, or service provider designation

With your merchant or service provider designation, and your rough transaction volume, you can figure out what level you are and the associated assessment type. It’s worth noting that QSAs and RoCs aren’t involved until you hit higher transaction volumes. So at a minimum, you’re likely looking at an SAQ and an AoC.

Merchant LevelTransaction VolumeAssessment Type
Level 1>6 million transactions/year or high-riskROC by QSA + AOC
Level 21M–6M transactions/yearSAQ (varies) + AOC
Level 320k–1M e-comm transactions/yearSAQ (varies) + AOC
Level 4<20k e-comm or <1M total transactions/yearSAQ (varies) + AOC (optional)
Service Provider LevelTransaction VolumeAssessment Type
Level 1>300k transactions/yearROC by QSA + AOC
Level 2≤300k transactions/yearSAQ D + AOC

If you need help determining what SAQ type applies to you, there’s some PCI DSS documentation that has a couple of diagrams that walk you through the process (pages 24 and 25). It’s more straightforward for businesses that are solely service providers (always SAQ-D). For merchants, it depends a lot more on how you’re storing and interacting with cardholder data. It’s also important to engage your acquirer to agree what attestation type is acceptable, and understanding these concepts allows you to drive the conversation.

GetLost commentary

We’re going to be a merchant and service provider, but we don’t have past transaction volumes to go off of yet since we’re still in the build phase. Our forecasts make us think we’ll need to be level one compliant but we’ll need to look into this more.

Merchant of record

While its origin is outside of PCI DSS, merchant of record (MoR) is something to be aware of. MoR sprung out of ecommerce growth and the need to have a legal entity for a business that handles the payment process on behalf of other businesses. The MoR is whoever:

  • Sells the goods or services
  • Owns the account that funds settle in
  • Has the MID with the acquirer

It’s of course possible to be a MoR if you’re a merchant, but also if you’re a service provider. Who the MoR is matters because they’re responsible for PCI DSS compliance for:

  • Their own use of cardholder data
  • Any subprocessors they engage with, meaning the MoR has to get assurance (usually through an Attestation of Compliance) from their subprocessors

Risks of non-compliance

Complying with PCI DSS is just part of handling cardholder data. While the Security Standard Council defines the requirements, they don’t actually enforce the rules. Card networks and acquiring banks are primarily responsible for this. It works kind of like this:

  • VISA, Mastercard, etc., mandate compliance
  • Acquiring banks adhere to the mandate by contractually requiring merchants to comply with PCI DSS
  • If a merchant works with a service provider, they in turn require the service provider to be compliant

If you don’t comply, card networks and acquiring banks may:

  • Charge you fees and fines
  • Block transactions

There isn’t a single place to look up the fees you might be charged, or how card networks determine when to block transactions. The amounts and rules vary by card network and acquirer, but you can review Mastercard’s rules for some context. If you look at the section for Payment System Integrity noncompliance (section 2.1.4, category A), you can see they might charge you on a per violation basis: up to USD 25,000 for the first violation, up to USD 50,000 for the second violation within 12 months, etc. They can also charge on a variable occurrence basis, which means they might charge you a fee for every credit card impacted by noncompliance. Regardless, total fine amounts can get quite high. If you’re non-compliant, there’s usually a remediation process you can follow to regain compliance, but fees may continue to accrue while you go through the process.

Estimating compliance impact on your team

For some teams, compliance involves a near constant cross-team effort. If your scope is narrower, you might be able to handle it with a smaller group but it’s important to know that multiple teams are usually involved. Engineering (across the stack), compliance, security, and product teams might all be involved at some point.

Our business case for reducing PCI DSS scope goes into more detail, but a company using their own datacenters and implementing controls for all 12 requirements might face estimates like this.

RequirementEffort/costComplexityFTE (Days)
Firewall configurationMediumHigh15
Secure configurationsMediumHigh20
Protect stored dataHighVery High20
Encrypt transmissionsMediumMedium10
Malware protectionMediumMedium15
Secure systems/applicationsVery HighVery High45
Access restrictionsMediumHigh15
Identify/Authenticate accessHighHigh15
Physical access controlMediumMedium10
Logging and monitoringVery HighHigh40
Security testingHighHigh25
Information security policy and IRMediumMedium20
Total: 250

We also wrote about PCI DSS from just a developer point of view. Again, the impact depends on what you’re in scope for, but the effort can quickly snowball into a project that takes your team away from building your core product.

Regardless of the approach, you’ll need to account for compliance in your own internal roadmaps and product planning. After you have everything in place and complete your initial assessment, there’s still ongoing attestation to do. The best thing you can do to ease the burden on your team and remain compliant is to reduce your compliance scope.

GetLost commentary

We realize those estimates in the example are on the high end but we don’t plan to manage everything in-house regardless. Our team is fairly lean and isn’t really built at this time to manage a huge compliance burden. Just looking at server hardening (part of requirement two) would be a big lift. We’d currently expect to have ~200 servers in scope with a mix of stacks. Hardening these to Center for Internet Security (CIS) benchmarks in production would be months of effort, and the risk of something going wrong is significant.

Descoping introduction

Descoping is the process of evaluating your CDE and making changes to it that reduce your compliance requirements and the number of controls you need in place. You can’t descope from PCI DSS entirely, but you can significantly reduce the number of controls you need in place. For something to be considered out of scope:

  • A system component must be properly segmented (isolated) from the CDE, such that the out-of-scope system component could not impact the security of account data, even if that component was compromised.
  • Segmentation must be implemented and verified via penetration testing to confirm connections to the CDE are not possible.

Your PCI scope largely has to do with how you collect and store card data. Handling it yourself means broader scope and more applicable controls. Using a third party to handle card data on your behalf, for parts or all of the payments process, reduces scope and applicable controls.

Reducing compliance scope is beneficial but what it really translates to is more time spent on building your core products and improving your customer experience. Compliance is important, and it can even be a selling point for your company, but we’re guessing you’d rather grow your garden than spend time building the fences around it.

Where to go from here

At this point, you hopefully have a better understanding of PCI DSS and its implications. Much of the groundwork laid in this article was in preparation for our next section on the different options for collecting and storing card data. None of what we covered was meant to intimidate you. The goal is education and that involves going deep into topics and being straightforward about the implications. While it can seem like a lot, Evervault was built for this space and its complexities. Much of the compliance burden we just covered can become our burden instead, which frees you up to build your company’s future.

GetLost commentary

The summary for us:

  • PCI DSS exists (for good reasons but it’s a lot to process) and we need to comply, as do our partners that handle data that’s in scope
  • We’re a merchant and service provider
  • We want to take on as little compliance burden as possible, which sounds like it can vary depending on how we approach collecting and storing (if at all) card data

This content is for general information and educational purposes only. It shouldn't be taken as legal, compliance, or tax advice. Evervault doesn't guarantee the completeness or accurateness of this content, and you should always consult with a lawyer, qualified security assessor (QSA), accountant, or similar professional for advice on any of the topics covered.

Next chapter

Options for collecting card data

Keep readingExplore all chapters