A former PCI standard for payment application vendors, ensuring their products do not store prohibited data and support merchant PCI DSS compliance. PA-DSS has been replaced by the PCI Software Security Framework (SSF), which includes the Secure Software Standard and the Secure Software Lifecycle Standard. Existing PA-DSS validations remain valid until their expiration date.
The process of identifying, evaluating, testing, and deploying software patches and updates to address security vulnerabilities. PCI DSS Requirement 6.3 requires that critical security patches be installed within one month of release. A documented patch management process must cover all system components in the CDE, including operating systems, applications, and firmware.
An organisation that operates a payment card network and sets the rules for card acceptance, including PCI DSS compliance requirements. The five major payment brands — Visa, Mastercard, American Express, Discover, and JCB — founded the PCI SSC. Each brand has its own compliance programme with specific merchant level thresholds, deadlines, and penalty structures.
A service provider that enables sub-merchants to accept card payments under the PayFac's merchant account with an acquirer. The PayFac assumes responsibility for sub-merchant onboarding, risk management, and PCI DSS compliance oversight. PayFacs must be PCI DSS Level 1 compliant and are accountable for their sub-merchants' compliance.
Example
Square and Stripe act as PayFacs, allowing small businesses to accept card payments without establishing their own merchant accounts.
A technology service that transmits payment transaction data from the merchant to the acquirer or payment processor. Payment gateways are service providers under PCI DSS and must be PCI DSS compliant. Merchants should verify their gateway's compliance status and understand which party is responsible for each PCI DSS requirement.
Example
Stripe, Braintree, and Adyen are examples of payment gateways that offer PCI-compliant hosted payment pages to reduce merchant scope.
The infrastructure and rules that connect issuers, acquirers, and merchants to facilitate payment card transactions. Payment networks (e.g., VisaNet, Mastercard Network) route authorisation requests, clearing data, and settlement funds between parties. They also set the operating regulations that govern dispute resolution, interchange fees, and security requirements including PCI DSS compliance.
A web page where cardholder data is collected during an e-commerce transaction. The security of the payment page directly affects PCI DSS scope and SAQ eligibility. Options include fully hosted pages (redirect), iframe-embedded pages, or JavaScript integrations. PCI DSS v4.0 introduced new requirements (6.4.3, 11.6.1) for monitoring scripts on payment pages.
Example
A merchant embeds their payment provider's iframe on their checkout page, so cardholder data is collected by the provider's domain, not the merchant's.
An entity that handles the technical processing of payment card transactions on behalf of acquirers or merchants. Payment processors route authorisation requests to the card networks and issuers, and handle clearing and settlement. As service providers, they must maintain their own PCI DSS compliance and provide evidence of compliance to their clients.
A device used at the point of sale to capture payment card data via magnetic stripe, EMV chip, or contactless interface. Terminals must be PCI PTS-approved and regularly inspected for tampering. PCI DSS Requirement 9 mandates physical security controls for terminals, including tamper-evidence checks and personnel training.
A PCI standard that provides security requirements for environments performing 3DS functions — the authentication protocol that adds an additional verification layer for card-not-present transactions. 3DS (e.g., Visa Secure, Mastercard Identity Check) reduces fraud by verifying the cardholder's identity with the issuing bank during online transactions.
The global security standard for all entities that store, process, or transmit cardholder data and/or sensitive authentication data. PCI DSS provides a framework of 12 high-level requirements organised into 6 control domains. Version 4.0.1 is the current version, with full enforcement from March 2025. Compliance is mandated by the payment brands (Visa, Mastercard, etc.) and enforced through acquirers.
A PCI standard that specifies requirements for the secure management, processing, and transmission of PIN data during online and offline payment card transactions. PCI PIN covers key management, cryptographic operations, and the physical and logical security of devices that handle PIN data. Acquirers and processors managing PIN transactions must comply with PCI PIN.
A PCI SSC standard that defines security requirements for PIN acceptance and processing devices. PCI PTS covers device hardware and firmware security, cryptographic key management, and device lifecycle management. Only PTS-approved devices should be used for PIN entry in PCI DSS environments.
Example
Before deploying a new payment terminal, a merchant verifies it appears on the PCI SSC list of PTS-approved devices.
The global forum founded in 2006 by Visa, Mastercard, American Express, Discover, and JCB to develop, manage, and promote PCI security standards. The PCI SSC maintains PCI DSS, PA-DSS (now SSF), PCI PTS, PCI P2PE, PCI 3DS, and PCI PIN standards. It also qualifies QSAs, ASVs, PFIs, and other security professionals. The PCI SSC does not enforce compliance — that responsibility lies with the payment brands and acquirers.
A PCI standard that governs entities providing payment tokenisation services, ensuring tokens are generated, managed, and de-tokenised securely. TSPs replace PANs with tokens for use in payment transactions, reducing the risk of data exposure. TSPs must maintain the security of the token vault and ensure tokens cannot be reverse-engineered to reveal the original PAN.
A controlled, simulated attack against systems and networks to identify exploitable security vulnerabilities. PCI DSS Requirement 11.4 mandates annual penetration testing (or after significant changes) of the CDE perimeter and critical systems, covering both network-layer and application-layer tests. The methodology must be based on an industry-accepted approach such as NIST SP 800-115 or OWASP.
Example
A qualified penetration tester attempts to exploit vulnerabilities in the merchant's e-commerce application to demonstrate whether an attacker could access cardholder data.
A qualified forensic investigator certified by the PCI SSC to conduct forensic examinations following a suspected or confirmed payment card data breach. PFIs determine the scope of the compromise, identify the attack vector, assess what data was exposed, and provide recommendations for remediation. Acquirers and payment brands may mandate a PFI investigation after a breach.
A social engineering attack that uses deceptive emails, messages, or websites to trick individuals into revealing sensitive information or installing malware. PCI DSS Requirement 12.6 requires security awareness training that covers phishing threats. Spear phishing targets specific individuals, while whaling targets senior executives.
Example
An attacker sends an email impersonating the CFO, asking the finance team to "verify" payment card data on a spoofed website.
A Personal Identification Number used to verify the cardholder at a point-of-interaction device. A PIN block is the encrypted representation of the PIN combined with the PAN using a standard format (e.g., ISO 9564). PIN and PIN block data are classified as SAD and must be encrypted in transit and never stored after authorisation.
Example
When a cardholder enters their PIN at an ATM, the terminal encrypts it into a PIN block before transmitting it to the issuer for verification.
The initial point where payment card data is captured — typically a payment terminal, card reader, or e-commerce payment page. POI devices must be secured against physical tampering and logical attacks. In a P2PE solution, the POI is where encryption first occurs.
A PCI-validated solution that encrypts cardholder data at the point of interaction (POI) using validated encryption hardware, and the data cannot be decrypted until it reaches the secure decryption environment. P2PE-validated solutions significantly reduce the merchant's PCI DSS scope because the merchant never has access to cleartext cardholder data.
Example
A retail merchant using a PCI-listed P2PE solution can qualify for SAQ P2PE, which has significantly fewer requirements than SAQ D.
The unique payment card number (typically 14–19 digits) that identifies the issuer and the cardholder account. The PAN is the defining element of cardholder data — if PAN is not present, PCI DSS requirements do not apply. It must be rendered unreadable anywhere it is stored using truncation, tokenisation, hashing, or strong cryptography.
Example
A Visa card number such as 4111 1111 1111 1111 is a PAN. Storing it in plaintext violates PCI DSS Requirement 3.