Skip to main content
TemplateFREE⏱️ 3-6 months

PCI-DSS Compliance Checklist Template

A structured PCI-DSS v4.0 compliance checklist for product teams handling payment card data, covering network security, cardholder data protection,...

Updated 2026-03-05
PCI-DSS Compliance Checklist
#1
#2
#3
#4
#5

Edit the values above to try it with your own data. Your changes are saved locally.

Get this template

Choose your preferred format. Google Sheets and Notion are free, no account needed.

Frequently Asked Questions

Do we need PCI compliance if we use Stripe?+
Yes, but your scope is significantly reduced. Using Stripe.js (client-side tokenization) or Stripe Checkout (hosted page) means your servers never touch raw card data. This qualifies you for SAQ A (iframe/redirect) or SAQ A-EP (API integration). You still need to secure your website (HTTPS, no mixed content), protect your API keys, and maintain an information security policy. Full PCI-DSS (SAQ D) applies only if your server-side code processes, stores, or transmits cardholder data directly.
What is the difference between SAQ A and SAQ A-EP?+
SAQ A applies when all payment processing is fully outsourced via iframe or redirect (e.g., Stripe Checkout hosted page). Your website never directly interacts with cardholder data. SAQ A-EP applies when your website controls the page that collects payment data (e.g., Stripe.js/Elements embedded in your page) but card data is tokenized client-side and sent directly to the processor. SAQ A has 22 requirements. SAQ A-EP has 139 requirements. For a fuller picture of payment infrastructure decisions, the [glossary entry on technical debt](/glossary/technical-debt) covers how payment architecture choices compound over time.
What changed in PCI-DSS v4.0?+
Major changes: MFA now required for all access to the CDE (not just remote access). Minimum password length increased to 12 characters (or 8 with complexity). Phishing protections are now explicitly required. Web application protection must be continuous and automated (not just annual WAF review). A "customized approach" allows organizations to meet requirements through alternative controls with targeted risk analysis. System and application account management has new specific requirements. All future-dated requirements became mandatory March 31, 2025.
How often do we need to validate PCI compliance?+
Compliance validation is annual. The method depends on your transaction volume and service type. Most merchants processing fewer than 6 million transactions complete an annual SAQ. Merchants above 6 million need an annual Report on Compliance (ROC) by a QSA. Service providers processing above 300,000 transactions need a ROC. Additionally, ASV vulnerability scans are required quarterly, and internal pen tests are required annually. Your acquiring bank dictates the exact requirements based on your merchant level.
Can PCI scope be reduced through network segmentation?+
Yes. Network segmentation is the primary strategy for reducing PCI scope. Systems that do not store, process, or transmit cardholder data can be placed outside the CDE if properly segmented. Effective segmentation requires validated network controls (firewalls, VLANs, security groups) that prevent out-of-scope systems from communicating with the CDE. Segmentation must be verified by penetration testing at least annually. Cloud architectures using VPCs and security groups are well-suited to segmentation. ---

Explore More Templates

Browse our full library of PM templates, or generate a custom version with AI.