There are different processes for achieving each level of certification. All four levels require businesses to complete a self-assessment questionnaire. Level 1 and 2 merchants must also complete a Report on Compliance (RoC). In addition, Level 1 merchants must submit to a yearly compliance audit by a Qualified Security Assessor (QSA) and scan their networks quarterly using an Approved Scanning Vendor (ASV). The PCI SSC maintains a list of approved QSAs and ASVs.
PCI DSS compliance requires merchants to continuously assess their hardware, software and security technologies, and business processes that manage payment card data and transactions. When merchants discover vulnerabilities in their system, they must address those vulnerabilities to maintain the security of card data and transactions. They must keep records of these assessments and how they fixed any vulnerabilities, and regularly share reports on their PCI DSS compliance with the banks and card companies they use.
Merchants must have a robust security infrastructure to achieve and maintain PCI DSS compliance. This means continuously reducing their attack surface and addressing any vulnerabilities to the card processing systems. Some examples of this include:
- Basic security tools, like firewalls and antivirus software
- Strong access controls that restrict access to cardholder data for employees, contractors and third-party vendors and record any access events that take place
- Encryption of stored and transmitted data
- Penetration testing of systems to discover vulnerabilities
- Client-side security solutions that provide real-time visibility into the client-side supply chain attack surface to proactively identify vulnerabilities and anomalous behavior
- Granular client-side JavaScript blocking to prevent code from third-party vendors from accessing sensitive payment form fields, without disabling the entire script
- Bot management solutions that stop carding bots from making fraudulent purchases with stolen credit card data
Compliance with PCI DSS is not a one-time event, but an ongoing process. Organizations must continually assess and improve their security measures to keep up with the evolving threat landscape and ensure that their customers’ data remains safe and secure. This means monitoring all systems and transactions for abnormal activity in real time. By doing so, they can build trust with their customers and maintain a positive reputation in the marketplace.