Organisations that accept card payments are required to handle cardholder data securely. PCI DSS v4.0.1 is the current standard, and the PCI Security Standards Council (PCI SSC) provides comprehensive materials including the standard itself, the Quick Reference Guide, and the ROC and AOC templates that all organisations must follow.
This guide explains the 12 PCI DSS requirements, Self‑Assessment Questionnaires (SAQs), merchant levels, service provider levels and assessment expectations. It also provides sector‑specific context for retailers and social housing providers, including the use of allpay by many housing associations.
Use the following simple checks to determine whether you are in PCI scope. This is not a full assessment but a quick way to understand your likely obligations.
If your provider handles cardholder data for you, you must ensure they are PCI validated and may still have some PCI obligations yourself. PCI SSC emphasises this in its standards guidance.
Before approaching PCI DSS obligations, it is essential to understand two foundational categories.
A merchant is any entity that accepts payment cards displaying the logos of the PCI SSC founding brands for goods or services. This definition applies across retail and social housing. If an organisation processes card transactions via POS, e‑commerce, mobile applications, virtual terminals or automated phone payments, it is considered a merchant. This definition appears in widely referenced PCI explanations and Mastercard’s Site Data Protection guidance.
In practice:
A service provider is any entity that stores, processes or transmits cardholder data on behalf of another organisation, or could influence the security of a cardholder data environment (CDE). This includes payment gateways, hosting providers, SaaS billing platforms, tokenisation services, managed firewall providers and call‑masking providers.
Examples:
Understanding merchant and service provider roles is essential because each category has different PCI obligations.
Below is a clear and practical explanation of each requirement.
Organisations must ensure networks are segmented, access paths are restricted and firewall rules are maintained. Retail POS networks and housing management systems must be separated from payment systems.
All systems must be hardened. Vendor defaults cannot be used, and only essential services should remain active.
Minimise storage and apply strong encryption if holding cardholder data is unavoidable. Sensitive Authentication Data must never be retained.
Any transmission of cardholder data across open networks must be encrypted using strong protocols.
Malware detection and prevention must be in place and updated regularly. POS may require allow‑listing controls.
Systems and software must be updated and patched. E‑commerce platforms and payment portals require regular security reviews.
Access must be limited to individuals whose roles require it. Least privilege is vital for internal and external users.
Unique credentials are required and multi‑factor authentication must be used for administrative and remote access.
Physical areas storing or processing cardholder data must be secured.
Logging must be centralised, tamper resistant and actively monitored. This helps identify suspicious activity.
Organisations must conduct regular testing, including ASV scans and penetration testing. PCI DSS v4.x stresses continuous monitoring.
Policies, procedures and training must be maintained to support compliance.
SAQs depend on how the organisation accepts card payments.
Call‑masking solutions allow tenants or customers to enter card details through DTMF tones that are converted into flat tones before reaching the contact centre. This prevents card data from entering systems and recordings, keeping the organisation out of scope for telephone cardholder data handling. Solutions provided through Allpay and its partners enable housing providers to qualify for SAQ A for phone payments.
Merchant levels are based on annual transaction volumes. Mastercard’s Site Data Protection criteria serve as a clear reference. [pcicompliance.com]
Acquirers determine the final validation path for each merchant.
Service provider requirements differ from merchant requirements.
A ROC is a formal PCI DSS assessment performed by a Qualified Security Assessor (QSA) for Level 1 merchants and Level 1 service providers. It results in a detailed report and an Attestation of Compliance.
A QSA is an independent assessor trained and approved by the PCI Security Standards Council to evaluate PCI DSS compliance. PCI SSC emphasises the role of QSAs and maintains a global list of approved assessors.
An ISA is an internal employee trained through PCI SSC’s ISA programme. An ISA may support internal preparation and evidence gathering, but ROCs for Level 1 entities must still be signed off by an appropriate assessor, depending on scheme and acquirer requirements.
PCI SSC does not issue fines directly. Card brands and acquirers enforce penalties if a merchant or service provider is non‑compliant or suffers a breach while non‑compliant. Typical consequences include:
These enforcement mechanisms are reflected throughout card brand compliance documentation and merchant level criteria.
Retailers operate in environments with integrated POS systems, third‑party components, web scripts and complex change management. PCI SSC merchant resources highlight the risks of malware, phishing and remote access in retail settings. [masterblogging.com]
Housing providers rely on multi‑channel payment services from providers such as AllPay, which supports hundreds of associations and maintains PCI DSS Level 1 compliance.
Call‑masking solutions help providers reduce PCI scope and improve tenant confidence.
Acquiring banks play a central role in PCI DSS compliance. They:
PCI SSC highlights that entities must work closely with acquirers to confirm whether they are required to validate PCI DSS compliance.
Merchants must maintain ongoing communication with their acquirers, especially when adding new payment channels, outsourcing services or responding to a suspected breach. Acquiring banks may also request for you to undertake a formal report on compliance.
A PCI Forensic Investigation (PFI) is required when cardholder data is suspected or confirmed to be compromised. PFIs must be performed by a PCI SSC‑approved forensic investigator.
A PFI is mandated when:
A PFI team will:
Organisations must:
You may be required to:
Breaches can lead to significant financial consequences including fines, increased fees, forced migration to Level 1 validation and potential loss of card processing privileges.
The PCI SSC Document Library remains the central repository for authoritative PCI DSS information.
GRC Hub supports organisations with scoping, SAQ selection, evidence preparation, remediation planning and ongoing assurance.
Explore our PCI services.
Need more help?
Contact us for expert help.