PCI DSS v4.0 Compliance Checklist: Complete Guide for 2026
PCI DSS compliance is required for any organization that stores, processes, or transmits payment cardholder data. Version 4.0 introduces significant changes including customized validation approaches and new requirements for authentication, encryption, and security testing. This checklist guides you through implementing all 12 PCI DSS requirements and preparing for your assessment, whether you complete a Self-Assessment Questionnaire or undergo a full QSA audit.
Work through each phase in order. Most organizations complete this checklist in 3-9 months for initial compliance; varies by merchant level and scope.
Table of Contents
Phase 1: Prepare
6 items in this phase
Determine your PCI DSS merchant or service provider level
Identify your merchant level (1-4) based on annual transaction volume or your service provider level based on the number of transactions processed. This determines whether you need a QSA assessment or can self-assess.
Define the cardholder data environment scope
Map all systems, networks, and processes that store, process, or transmit cardholder data, as well as any systems connected to them. Minimizing scope through network segmentation can significantly reduce compliance effort and cost.
Identify where cardholder data is stored and flows
Create a cardholder data flow diagram showing how payment data enters, moves through, and exits your environment. Include all third parties, transmission channels, and storage locations.
Engage a Qualified Security Assessor if required
Level 1 merchants and service providers must engage a QSA for their assessment. Research and select a PCI-qualified assessor with experience in your industry and payment processing model.
Conduct a gap analysis against PCI DSS v4.0
Assess your current security posture against all 12 PCI DSS requirements and the new v4.0 controls. Pay special attention to new requirements for MFA, targeted risk analysis, and security awareness programs.
Evaluate scope reduction opportunities
Investigate tokenization, point-to-point encryption (P2PE), and network segmentation to reduce the cardholder data environment. Smaller scope means fewer controls to implement and maintain.
Phase 2: Implement
12 items in this phase
Install and maintain network security controls
Implement firewalls, network segmentation, and security groups to protect the cardholder data environment. Configure rules to restrict inbound and outbound traffic to only what is necessary for payment processing.
Apply secure configurations to all system components
Remove default passwords, disable unnecessary services, and apply hardening standards to all servers, databases, network devices, and applications in the CDE. Document configuration standards for each technology.
Protect stored cardholder data
Implement strong encryption (AES-256 or equivalent) for stored cardholder data, mask PAN when displayed, and render data unrecoverable when no longer needed. Implement key management procedures and minimize data retention.
Encrypt cardholder data in transit
Use strong cryptography (TLS 1.2+) to protect cardholder data during transmission over open, public networks. Ensure certificates are valid and trusted, and that insecure protocols are disabled.
Implement anti-malware and vulnerability management
Deploy anti-malware solutions on all systems, maintain patch management processes, and develop secure software practices. Address critical vulnerabilities within defined timeframes.
Implement strong access control measures
Restrict access to cardholder data on a need-to-know basis. Implement role-based access, unique user IDs, and multi-factor authentication for all access to the CDE and remote access.
Restrict physical access to cardholder data
Implement physical access controls for data centers and areas where cardholder data is present. Use badge systems, visitor management, and media destruction procedures.
Implement logging and monitoring
Log all access to cardholder data and network resources. Implement centralized log management, automated alerting for suspicious activity, and synchronize time across all systems.
Develop an incident response plan
Create an incident response plan specific to payment card data breaches. Include containment procedures, forensic investigation steps, card brand notification requirements, and communication protocols.
Implement change management processes
Establish formal change management procedures for all modifications to system components in the CDE. Include impact analysis, testing, approval, and rollback procedures.
Establish vendor and service provider management
Maintain a list of all service providers with access to cardholder data. Execute agreements requiring PCI DSS compliance, monitor their compliance status, and manage their access to the CDE.
Deploy security awareness training
Implement a security awareness program covering PCI DSS requirements, social engineering threats, and secure data handling procedures. Train all personnel with access to the CDE upon hire and annually.
Phase 3: Audit
6 items in this phase
Conduct internal and external vulnerability scans
Perform quarterly internal vulnerability scans and engage an Approved Scanning Vendor (ASV) for quarterly external scans. Remediate all high and critical vulnerabilities and rescan to validate fixes.
Perform annual penetration testing
Conduct network-layer and application-layer penetration tests of the CDE at least annually and after significant changes. Test both external and internal network segments and remediate findings.
Validate network segmentation controls
If network segmentation is used to reduce PCI DSS scope, test segmentation controls at least annually (every six months for service providers) to confirm that the CDE is effectively isolated.
Collect and organize compliance evidence
Gather documentation, screenshots, configurations, policies, and logs demonstrating compliance with each PCI DSS requirement. Organize evidence by requirement number for efficient assessor review.
Complete the SAQ or facilitate the QSA on-site assessment
For self-assessment, complete the appropriate Self-Assessment Questionnaire honestly and thoroughly. For QSA assessments, facilitate on-site interviews, observations, and document reviews.
Submit the Attestation of Compliance
Complete and submit the Attestation of Compliance (AOC) to your acquiring bank and card brands. Address any compensating controls documentation and ensure all sections are properly completed.
Phase 4: Maintain
5 items in this phase
Maintain continuous monitoring and alerting
Implement ongoing monitoring of the CDE including file integrity monitoring, intrusion detection, and log review. Respond to alerts promptly and document investigation outcomes.
Perform quarterly ASV scans and internal scans
Continue quarterly vulnerability scanning throughout the year. Ensure ASV scans produce passing results and that internal scans identify and remediate new vulnerabilities.
Review and update security policies annually
Conduct an annual review of all information security policies, procedures, and standards. Update them to reflect changes in the threat landscape, PCI DSS requirements, and your environment.
Conduct targeted risk analyses as required by v4.0
PCI DSS v4.0 introduces targeted risk analyses for determining frequency of certain activities. Complete and document these analyses for requirements where frequency is defined by risk assessment.
Manage the annual compliance cycle
Plan for annual reassessment, track changes to the CDE throughout the year, and maintain evidence collection processes to avoid last-minute scrambling before each assessment period.
Timeline & Cost
Estimated Timeline
3-9 months for initial compliance; varies by merchant level and scope
Estimated Cost
$15,000-$500,000 depending on merchant level, scope, and required infrastructure changes
Frequently Asked Questions
Who needs to comply with PCI DSS?
Any organization that stores, processes, or transmits payment cardholder data must comply with PCI DSS. This includes merchants of all sizes, payment processors, acquirers, issuers, and service providers. Even if you outsource payment processing, you may still have PCI DSS obligations depending on how cardholder data flows through your environment.
What are the PCI DSS merchant levels?
There are four merchant levels based on annual transaction volume. Level 1 (over 6 million transactions) requires a QSA on-site assessment. Level 2 (1-6 million) may use a SAQ with an optional QSA assessment. Level 3 (20,000-1 million e-commerce) and Level 4 (under 20,000 e-commerce or up to 1 million other) can typically self-assess using the appropriate SAQ. Your acquiring bank may impose additional requirements.
How much does PCI DSS compliance cost?
Costs vary dramatically by merchant level and scope. Small merchants using hosted payment pages may spend $1,000-$5,000 on an SAQ and ASV scans. Mid-size merchants might spend $15,000-$50,000 including security tooling. Level 1 merchants with complex environments can spend $100,000-$500,000 or more including QSA fees, infrastructure, penetration testing, and remediation.
What changed in PCI DSS v4.0?
PCI DSS v4.0 introduces a customized validation approach, expanded MFA requirements (for all access to the CDE, not just remote), targeted risk analysis for determining activity frequencies, enhanced authentication requirements, and new e-commerce security requirements. Many new requirements have a future-dated implementation deadline, giving organizations time to prepare.
Can I reduce my PCI DSS scope?
Yes, scope reduction is one of the most effective strategies for simplifying compliance. Techniques include tokenization (replacing cardholder data with tokens), point-to-point encryption (P2PE), hosted payment pages that keep cardholder data off your systems, and network segmentation to isolate the CDE. Each approach has trade-offs in terms of cost, complexity, and operational impact.
What happens if I fail PCI DSS compliance?
Non-compliance can result in fines from card brands ranging from $5,000 to $100,000 per month, increased transaction fees, restrictions on payment processing, and in severe cases, loss of the ability to accept card payments. If a breach occurs while non-compliant, you may face additional forensic investigation costs, liability for fraudulent transactions, and reputational damage.
How often do I need to validate PCI DSS compliance?
Compliance validation is required annually through either a QSA Report on Compliance (Level 1) or Self-Assessment Questionnaire. Additionally, quarterly external vulnerability scans by an Approved Scanning Vendor are required, along with annual penetration testing. Internal scans should be performed quarterly, and segmentation testing is required annually (semi-annually for service providers).
Other Checklists
Generate PCI DSS v4.0 policies automatically
PoliWriter creates all the policies referenced in this checklist, customized to your organization. AI-powered, audit-ready, hours not months.
Get Started Free