TheroPay LogoTheroPay

PCI DSS Essentials for Online Merchants

Scope reduction, tokenization, and evidence—how to keep audits manageable.

July 26, 2025
7 min read
J
Jessica Williams
Compliance Lead
PCI DSS Essentials for Online Merchants

PCI DSS compliance isn't just a checkbox—it's your defense against data breaches, regulatory fines, and reputational damage. For online merchants, understanding and implementing PCI DSS requirements is essential for secure payment processing.

This guide focuses on practical strategies to achieve and maintain compliance while keeping the burden manageable for your team.

Understanding PCI DSS Basics

The Payment Card Industry Data Security Standard (PCI DSS) applies to any organization that stores, processes, or transmits cardholder data. Compliance requirements vary based on your transaction volume and how you handle card data.

PCI DSS Compliance Levels

  • Level 1: Over 6 million transactions annually (annual on-site assessment)
  • Level 2: 1-6 million transactions (annual self-assessment)
  • Level 3: 20,000-1 million e-commerce transactions (annual self-assessment)
  • Level 4: Under 20,000 e-commerce transactions (annual self-assessment)
💡

Most online merchants fall into Level 3 or 4, making self-assessment questionnaires (SAQs) the primary compliance path.

The 12 PCI DSS Requirements

PCI DSS is built around 12 core requirements organized into 6 categories:

Build and Maintain Secure Networks

  • Requirement 1: Install and maintain firewall configuration
  • Requirement 2: Remove vendor-supplied defaults for system passwords

Protect Cardholder Data

  • Requirement 3: Protect stored cardholder data
  • Requirement 4: Encrypt transmission of cardholder data across open networks

Maintain Vulnerability Management

  • Requirement 5: Use and regularly update anti-virus software
  • Requirement 6: Develop and maintain secure systems and applications

Implement Strong Access Control

  • Requirement 7: Restrict access to cardholder data by business need-to-know
  • Requirement 8: Assign unique ID to each person with computer access
  • Requirement 9: Restrict physical access to cardholder data

Monitor and Test Networks

  • Requirement 10: Track and monitor all access to network resources
  • Requirement 11: Regularly test security systems and processes

Maintain Information Security Policy

  • Requirement 12: Maintain policy that addresses information security

Scope Reduction Strategies

The key to manageable PCI compliance is minimizing your scope—reducing the systems and processes that handle cardholder data.

Network Segmentation

  • Isolate payment processing systems from other networks
  • Use firewalls to control access between network segments
  • Implement proper routing and switching controls
  • Regular testing to validate segmentation effectiveness

Tokenization

Replace sensitive card data with non-sensitive tokens to dramatically reduce PCI scope.

  • Implement tokenization at the point of capture
  • Store only tokens in your systems
  • Use tokens for customer recognition and recurring billing
  • Ensure tokens are cryptographically irreversible

Tokenization can reduce PCI scope by 90% or more for many merchants.

Point-to-Point Encryption (P2PE)

  • Encrypt card data from the point of interaction to processing
  • Use validated P2PE solutions from approved vendors
  • Ensure no clear-text card data exists in your environment
  • Combine with tokenization for maximum scope reduction

Choosing the Right SAQ

Self-Assessment Questionnaires (SAQs) vary based on how you process payments. Choosing the right one is crucial for compliance.

Common SAQ Types for E-commerce

  • SAQ A: Card-not-present, outsourced payment processing (simplest)
  • SAQ A-EP: E-commerce with payment pages hosted by third party
  • SAQ D-Merchant: All other merchant environments (most complex)

Most e-commerce merchants should aim for SAQ A or A-EP by using hosted payment pages and avoiding storage of card data.

Evidence Collection and Documentation

PCI compliance requires extensive documentation. Start collecting evidence early and maintain it systematically.

Key Documentation Requirements

  • Network diagrams showing cardholder data flows
  • Data flow diagrams with all connection points
  • Inventory of all systems that store, process, or transmit card data
  • Security policies and procedures
  • Vulnerability scan reports
  • Penetration test results
  • Employee training records

Vulnerability Management

Regular vulnerability scanning and penetration testing are required for most compliance levels.

External Vulnerability Scanning

  • Must be performed by Approved Scanning Vendor (ASV)
  • Required quarterly for external-facing systems
  • Must achieve passing scan results
  • Remediate high-risk vulnerabilities immediately

Internal Vulnerability Scanning

  • Scan internal networks quarterly
  • Can be performed by internal teams or third parties
  • Focus on systems in cardholder data environment
  • Document remediation of identified vulnerabilities

Common Compliance Challenges

Learn from others' mistakes. These are the most common PCI compliance pitfalls:

  • Treating compliance as annual event instead of ongoing process
  • Inadequate network documentation and change control
  • Failing to maintain evidence throughout the year
  • Overlooking third-party vendor compliance requirements
  • Insufficient employee training and awareness

Maintaining Ongoing Compliance

PCI compliance isn't a once-per-year activity. Build processes to maintain compliance continuously.

  • Monthly review of security logs and access reports
  • Quarterly vulnerability scans and security assessments
  • Annual policy reviews and updates
  • Regular employee training and security awareness
  • Continuous monitoring of cardholder data environment

Working with Qualified Security Assessors

For Level 1 merchants and complex environments, working with a Qualified Security Assessor (QSA) is required.

  • Choose QSAs with experience in your industry and technology stack
  • Engage early in your compliance journey for guidance
  • Prepare thoroughly for assessments to minimize duration
  • Use QSA expertise for remediation recommendations
  • Consider ongoing managed compliance services
🚀

TheroPay's PCI-compliant infrastructure handles tokenization, encryption, and compliance evidence collection automatically. Focus on your business while we handle the complexity of PCI DSS compliance.