PCI-DSS
Compliance

A complete PCI-DSS compliance programme, from CDE scope reduction and SAQ guidance to network segmentation testing, external ASV scans, and comprehensive QSA audit preparation for merchants and service providers.

CDE Scope Reduction Quarterly ASV Scans Annual PCI Pen Testing QSA-Ready ROC/SAQ
Card Data Vault
Network Segmentation (Req 1)Compliant
Strong Cryptography (Req 2/4)Compliant
Secure Cardholder Data (Req 3)Compliant
Access Control (Req 7/8)Compliant
Vulnerability Management (Req 6/11)In Progress
PCI Scope
CDE Secured
Tokenised
Real-Time

Minimise Scope, Maximise Compliance

PCI-DSS compliance is not optional. Merchants and service providers that store, process, or transmit cardholder data face card brand fines, forensic investigation costs, and loss of card-processing privileges if non-compliant after a breach. Version 4.0 introduces 64 new requirements focussed on multi-factor authentication, e-commerce security, and custom implementation.

Scope Reduction

Minimise CDE via segmentation, tokenisation, and P2PE/E2EE per Requirement 1 and 3, reducing demonstrable controls for your QSA.

SAQ Completion

Guided SAQ completion for all types (A through P2PE) with control evidence templates mapped to Requirements 1-12.

Network Segmentation Testing

Validate segmentation isolates CDE from out-of-scope systems per Requirement 1.3 and scoping guidance.

CDE Gap Assessment

Gap current controls against all 12 PCI-DSS v4.0 requirement domains, prioritising remediation by risk severity.

Card Data Flow Mapping

Map cardholder data flows across systems, vendors, and payment channels to define precise CDE boundaries per Requirement 3.

Vendor Compliance Audit

Audit payment processors and service providers for PCI-DSS compliance, reviewing AOCs and data handling per Requirement 12.8.

ASV External Scanning

Quarterly ASV scans per Requirement 11.2 across all internet-facing CDE IP addresses and domains.

Penetration Testing

Annual penetration testing per Requirement 11.4 with internal, external, and segmentation validation components.

QSA Audit Preparation

Pre-audit readiness review, evidence packaging, and mock QSA assessment to produce a clean Report on Compliance.

Tokenisation Deployment

Deploy tokenisation per Requirement 3 to replace cardholder data with non-sensitive tokens, reducing CDE scope.

MFA and Access Controls

Deploy MFA per Requirement 8 with role-based access controls and privileged access management for CDE systems.

Logging and Monitoring Setup

Implement audit logging per Requirement 10 covering all CDE access, administrative actions, and security event correlation.

Quarterly ASV Scan Programme

Ongoing quarterly ASV scans per Requirement 11.2 with remediation tracking and rescan coordination.

Annual Penetration Testing

Annual penetration testing per Requirement 11.4 with internal, external, and segmentation validation.

Continuous Monitoring

Real-time CDE monitoring with file integrity monitoring, IDS, and alerting per Requirements 10 and 11.

SAQ Renewal and ROC Maintenance

Annual SAQ renewal or ROC preparation with updated evidence and acquiring bank submission coordination.

Change Management Review

Review CDE changes against all applicable PCI-DSS requirements to maintain compliance posture post-modification.

Incident Response Testing

Annual tabletop exercises for cardholder data breach scenarios aligned with PCI-DSS and card brand notification requirements.

Does PCI-DSS Apply to Your Business?

Merchants Accepting Card Payments

Any merchant accepting Visa, Mastercard, Amex, or Discover payments, whether in-store or online, must comply with PCI-DSS. Level determines assessment type.

Payment Service Providers & Gateways

Payment processors, gateways, and technology providers that store, process, or transmit cardholder data on behalf of merchants are subject to PCI-DSS as service providers.

E-Commerce & Online Retailers

Online retailers are particularly exposed to PCI-DSS's new e-commerce requirements covering client-side script integrity and payment page security.

How We Build Your PCI-DSS Programme

A structured six-phase process from initial CDE scoping through to ongoing annual compliance and ROC/SAQ renewal.

Phase 01
CDE Scoping and Gap Assessment

Define CDE scope, identify segmentation opportunities, map card data flows, and gap-assess current controls against all PCI-DSS v4.0 requirements.

01
02
Phase 02
Scope Reduction and Segmentation

Implement tokenisation, P2PE, or network segmentation to minimise CDE scope, then remediate identified control gaps across all twelve requirement domains.

Phase 03
Control Implementation and Remediation

Deploy required controls including MFA, encryption, access management, logging, and vulnerability management aligned to PCI-DSS v4.0 requirements.

03
04
Phase 04
ASV Scans and Penetration Testing

Conduct quarterly ASV scans and annual penetration testing with internal, external, and segmentation validation components.

Phase 05
QSA Audit Preparation

Pre-audit readiness review, evidence packaging, and mock QSA assessment to ensure a smooth on-site audit and clean Report on Compliance (ROC).

05
06
Phase 06
Ongoing Compliance and Annual Renewal

Quarterly ASV scans, annual penetration testing, SAQ renewal, ROC maintenance, and continuous monitoring to sustain PCI-DSS compliance year-round.

Questions We Get Asked Often

PCI-DSS (Payment Card Industry Data Security Standard) is a set of security standards for organisations that store, process, or transmit cardholder data, mandated by major card brands including Visa, Mastercard, and American Express.

Any organisation that stores, processes, or transmits cardholder data must comply with PCI-DSS, including merchants, payment gateways, service providers, and processors at all levels.

Scyverge PCI-DSS compliance includes scope reduction through network segmentation and tokenisation, SAQ completion, network segmentation testing, ASV scanning, and QSA audit support.

Non-compliance can result in fines of $5,000 to $100,000 per month from payment brands, increased transaction fees, or loss of card processing privileges. Acquiring banks may also impose remediation deadlines.

Level 1 merchants with existing security controls typically achieve compliance in 2 to 4 months. Organisations starting from scratch may need 6 to 9 months. Scyverge prioritises CDE scoping and scope reduction first.

Achieve PCI-DSS Compliance

Start with a scoping and gap assessment tailored to your merchant level and acquiring bank requirements.