This recipe produces a fully compliant PCI DSS v4.0.1 posture for a retail or e-commerce business — including a gap assessment report, remediated payment page script controls (Req 6.4.3 + 11.6.1), deployed MFA across the cardholder data environment, passing ASV scan results, penetration test report, and continuous monitoring dashboard — ready for SAQ submission or QSA-led ROC validation. All 51 future-dated requirements that became mandatory on March 31, 2025 are covered. [src2]
Which SAQ type?
├── All cardholder data outsourced to third-party hosted payment page?
│ └── SAQ A — but still must implement Req 6.4.3 + 11.6.1 on checkout pages
├── E-commerce with third-party payment processing but merchant controls flow?
│ └── SAQ A-EP — full script inventory + CSP + tamper detection required
├── Payment terminals only (no e-commerce)?
│ ├── Imprint machines or standalone dial-out terminals?
│ │ └── SAQ B — minimal scope
│ └── IP-connected terminals?
│ └── SAQ B-IP or SAQ C
├── Payment application connected to internet (no e-commerce card storage)?
│ └── SAQ C — network segmentation + access controls required
├── P2PE hardware terminal with validated encryption?
│ └── SAQ P2PE — reduced scope through validated encryption
└── Does not fit any above OR stores cardholder data?
└── SAQ D — full 12 requirement families, all controls required
| Path | Applicable Merchants | Est. Annual Cost | Timeline | Complexity |
|---|---|---|---|---|
| SAQ A | Hosted checkout only (Stripe/Adyen iframe) | $3K–$15K | 1–3 months | Low — but Req 6.4.3/11.6.1 still required |
| SAQ A-EP | E-commerce with redirect to processor | $10K–$50K | 2–4 months | Medium — script controls + CSP |
| SAQ C | IP-connected payment apps, no e-commerce storage | $10K–$40K | 2–4 months | Medium — network segmentation focus |
| SAQ D / ROC | Direct processing or stores cardholder data | $50K–$500K+ | 4–9 months | High — all 12 requirement families |
Duration: 2–4 weeks · Tool: Spreadsheet + network scanning tools (Nmap, Qualys)
Map every system component that stores, processes, or transmits cardholder data. Include all connected systems, network segments, and personnel with access. Document data flows from card entry to settlement. Review scope against all 12 PCI DSS requirement families and the 51 future-dated requirements. [src1]
Verify: Gap assessment document lists every non-compliant requirement with specific remediation action; CDE scope diagram reviewed and signed off by IT security lead · If failed: If scope cannot be determined, engage a QSA for a scoping consultation ($5,000–$15,000) before proceeding — incorrect scope invalidates the entire assessment
Duration: 2–6 weeks · Tool: Client-side monitoring tool (Feroot, Imperva, Akamai, c/side) + CSP headers
This is the highest-risk requirement for e-commerce retailers. Inventory every script executing on payment pages, authorize each one, and deploy tamper detection. Most retailers discover 15–40 scripts they did not know existed on their payment pages. [src3]
Verify: Script inventory complete (automated tool vs manual DevTools audit); CSP deployed and reporting violations; tamper detection active with test alert confirmed; no unauthorized scripts remain · If failed: If script count exceeds 30, prioritize removal before authorization. If CSP breaks page functionality, use Content-Security-Policy-Report-Only first. [src6]
Duration: 1–3 weeks · Tool: MFA provider (Duo, Okta, Microsoft Entra, Google Workspace)
PCI DSS v4.0 expanded MFA from remote-access-only to all access into the cardholder data environment — including local/console access, application access, and network device management. [src1]
Verify: MFA active on 100% of CDE access paths; test each path to confirm MFA challenge triggers; password policy enforced; no shared accounts in CDE · If failed: If legacy POS cannot support MFA, implement compensating controls (network segmentation + enhanced monitoring + restricted access hours) — requires QSA approval for Level 1
Duration: 2–4 weeks · Tool: Firewall management, encryption tools, network scanning
Ensure the CDE is properly segmented from non-CDE networks. Encrypt cardholder data at rest (AES-256) and in transit (TLS 1.2+). Deploy tokenization where possible to reduce scope. Deploy 3DS2 for CNP transactions. [src1]
Verify: Network scan shows no unauthorized traffic crossing CDE boundary; SSL/TLS test confirms only TLS 1.2+ accepted; encryption key management documented; tokenization operational · If failed: If legacy systems require TLS 1.0, document compensating controls and plan migration — TLS 1.0/1.1 is an automatic ASV scan failure. [src7]
Duration: 2–4 weeks · Tool: ASV provider (quarterly) + penetration testing firm (annual)
Run quarterly external ASV scans and internal vulnerability scans. Conduct annual penetration testing of both external perimeter and internal CDE segmentation. Remediate all findings and re-test. ASV pass criteria: no CVSS ≥ 4.0, no SSL 2.0/3.0, no TLS 1.0/1.1, no DES/3DES/RC4. [src8]
Verify: ASV scan report shows “Pass” status; penetration test shows all exploitable vulnerabilities remediated; internal scan shows no critical/high findings unresolved · If failed: Remediate flagged vulnerabilities and re-scan within the same quarter. Budget extra 2–4 weeks for remediation cycles. [src7]
Duration: 2–4 weeks setup + ongoing · Tool: SIEM, automated script monitoring, dashboard
PCI DSS v4.0 shifted from point-in-time compliance to continuous monitoring. Deploy automated tools that maintain compliance evidence as a byproduct of daily operations, not annual audit sprints. [src3]
Verify: All monitoring tools operational and generating alerts; dashboard shows current compliance status across all 12 requirement families; first automated scan cycle completed; alert routing confirmed · If failed: If SIEM integration is delayed, implement interim manual log review (daily) while automation is deployed — Req 10 is a common assessment failure point
Duration: 2–4 weeks · Tool: SAQ form or QSA engagement
Compile all evidence, complete the appropriate SAQ (or undergo QSA assessment for Level 1), and submit to the acquiring bank or payment brand. [src2]
Verify: All SAQ/ROC questions answered with supporting evidence; AOC signed; all scan reports current (within 90 days); no open critical/high findings · If failed: If QSA identifies gaps during ROC assessment, remediate and request re-assessment of specific requirements
{
"output_type": "pci_dss_compliance_package",
"format": "document collection",
"columns": [
{"name": "compliance_status", "type": "string", "description": "Compliant, Non-Compliant, or In Progress with specific gap list"},
{"name": "saq_type", "type": "string", "description": "SAQ A, A-EP, B, B-IP, C, C-VT, D, or P2PE — or ROC for Level 1"},
{"name": "merchant_level", "type": "number", "description": "PCI merchant level 1-4"},
{"name": "gap_count", "type": "number", "description": "Number of non-compliant requirements identified"},
{"name": "script_inventory_count", "type": "number", "description": "Total scripts on payment pages — authorized and inventoried"},
{"name": "asv_scan_status", "type": "string", "description": "Pass or Fail with date of most recent quarterly scan"},
{"name": "pen_test_status", "type": "string", "description": "Complete with all findings remediated, or open findings count"},
{"name": "mfa_coverage", "type": "number", "description": "Percentage of CDE access paths with MFA active"},
{"name": "open_remediation_items", "type": "number", "description": "Outstanding gaps requiring remediation"}
],
"expected_row_count": "1 (single compliance status record)",
"deduplication_key": "merchant_id + assessment_date"
}
| Quality Metric | Minimum Acceptable | Good | Excellent |
|---|---|---|---|
| CDE scope accuracy | All systems identified | Verified by independent scan | QSA-validated scope |
| Script inventory completeness | 90% of scripts inventoried | 100% inventoried + authorized | 100% + SRI hashes + CSP enforced |
| MFA coverage | 100% remote access | 100% all CDE access | 100% + hardware tokens for admin |
| ASV scan result | Pass (no CVSS ≥ 4.0) | Pass with < 5 low findings | Pass with 0 findings |
| Penetration test findings | All critical/high remediated | All findings remediated | Zero exploitable findings |
| Time to detect script change | < 7 days (weekly scan) | < 24 hours | Real-time (< 1 hour) |
| Vendor compliance attestations | All Level 1 vendors attested | All vendors attested | All vendors attested + monitored |
If below minimum: Halt validation submission. Re-run the relevant execution step. Submitting for assessment with known gaps wastes QSA fees and risks formal non-compliance findings on record. [src5]
| Error | Likely Cause | Recovery Action |
|---|---|---|
| ASV scan fails with high-severity findings | Unpatched systems, outdated TLS, exposed services | Patch/update flagged systems; disable TLS 1.0/1.1; re-scan within same quarter |
| CSP breaks payment page functionality | Overly restrictive policy blocking legitimate scripts | Switch to Content-Security-Policy-Report-Only first; analyze violations; whitelist legitimate sources; re-enforce |
| Script inventory misses dynamically loaded scripts | Tag managers (GTM) loading scripts not visible in static analysis | Use runtime monitoring tools; capture all scripts loaded during actual checkout flow including async/deferred |
| MFA breaks legacy POS management | Older systems lack MFA support | Document compensating controls (enhanced monitoring + restricted access); plan system upgrade; QSA approval required for Level 1 |
| Third-party vendor refuses compliance attestation | Vendor lacks PCI compliance or refuses to share evidence | Escalate contractually; switch vendors if no attestation within 60 days; document risk acceptance if no alternative |
| QSA rejects compensating controls | Controls insufficient to mitigate risk | Work with QSA to redesign controls; implement original requirement if feasible; consider architecture change to reduce scope |
| Penetration test reveals critical RCE vulnerability | Unpatched application or framework | Emergency patch; restrict access; re-test; do not proceed to validation until remediated |
| Component | Level 4 (Self-Managed) | Level 2–3 (Guided) | Level 1 (Enterprise) |
|---|---|---|---|
| QSA / SAQ assessment | $1K–$5K | $10K–$50K | $25K–$100K+ |
| ASV quarterly scans | $400–$1,200/yr | $1,200–$4,800/yr | $2,400–$10K/yr |
| Penetration testing | $5K–$10K/yr | $10K–$30K/yr | $20K–$100K+/yr |
| Script monitoring tool | $5K–$10K/yr | $10K–$25K/yr | $25K–$50K+/yr |
| WAF | $3K–$10K/yr | $10K–$25K/yr | $25K–$50K+/yr |
| SIEM / logging | $5K–$15K/yr | $15K–$50K/yr | $50K–$100K+/yr |
| MFA deployment | $1K–$5K | $5K–$15K | $15K–$50K |
| Remediation / hardening | $2K–$15K | $15K–$100K | $50K–$500K+ |
| Personnel (FTE allocation) | 0.25 FTE | 0.5–1 FTE | 1–3 FTE dedicated |
| Year 1 Total | $15K–$50K | $50K–$250K | $290K–$3.2M+ |
| Annual Ongoing | $10K–$35K | $40K–$175K | $265K–$2.7M+ |
Source: Enterprise cost ranges from Feroot Security 2026 analysis. [src5]
Controls degrade between assessments — scripts added without authorization, MFA exceptions accumulate. The next Magecart attack exploits a control that was compliant 10 months ago. Magecart attacks are attempted once every 16 minutes. [src6]
Deploy automated script monitoring that scans payment pages daily. Use CSP headers with violation reporting to an active dashboard. Integrate compliance status into security operations. [src2]
Even SAQ-A merchants must verify payment pages do not contain vulnerable scripts and must implement tamper detection (Req 11.6.1). Attackers can redirect customers to fake payment pages via scripts outside the iframe. [src3]
Confirm SAQ-A eligibility under updated v4.0.1 criteria. Still implement Req 6.4.3 (script inventory) and Req 11.6.1 (tamper detection) on checkout pages — the iframe protects the payment form, not the page surrounding it. [src4]
A compromised analytics, chat, or A/B testing script can harvest payment data as effectively as a direct server breach. The 2024–2025 Magecart surge (103% increase) exploited exactly this vector. [src6]
Maintain a complete script inventory with SRI hashes. Use CSP to restrict script sources to an explicit whitelist. Monitor for script changes in real-time. Remove any script from payment pages that does not have a documented business justification. [src4]
Use when a retailer or e-commerce business needs to actually execute PCI DSS v4.0.1 compliance — conduct the gap assessment, implement the technical controls, pass the scans, and submit validation documentation. Not a conceptual overview of what PCI DSS is, but the step-by-step execution from current state to passing validation. Requires payment architecture diagram and current compliance status as inputs; produces a validated compliance package as output.