SlideShare a Scribd company logo
How to Report on your PCI DSS Compliance
The Payment Card Industry – Data Security Standard (PCI DSS) is a set of requirements for merchants
and financial institutions, which helps them keep their cardholder data safe and secure. Once all
requirements to achieve PCI DSS compliance have been met, an organization needs to deliver a Report
on Compliance (RoC). The RoC is prepared at the time of the assessment of PCI compliance and
comprehensively provides details about the assessment approach and compliance standing against each
PCI DSS requirement. The PCI Security Standards Council (SSC) has provided a template for a Report on
Compliance in its PCI DSS Requirements and Security Assessment Procedures.
What is a Report on Compliance
A Report on Compliance or ROC is basically a form that needs to be filled by Level 1 Visa merchants who
are in the process of undergoing PCI DSS audit. Level 1 merchants are those merchants who carry out
more than six million Visa transactions in one business year.
Purpose of Report on Compliance
The purpose of RoC is the verification of the merchant in terms of its compliance with the PCI Data
Security Standard. This standard, which was formed with the collaboration of Master Card, Visa,
American Express and Discover, has laid down some requirements based upon a set of policies and
procedures to protect cardholder data from any potential fraud or information misuse.
The PCI DSS Report on Compliance is mostly prepared by a Quality Security Assessor who performs the
compliance audit. The QSA then must verify and prove the methodology of performing the validation as
well as the measuring of every entity against each requirement of the standard. This RoC is then
submitted to the bank of the merchant so that it can be accepted. The bank, after accepting the RoC,
further forwards it to Visa to verify for compliance.
Contents of your PCI DSS Compliance Report
According to the PCI DSS Requirements and Security Assessment Procedures document, RoC should
consist of the following main contents.
Section 1: Executive Summary
In executive summary an assessor has to describe the exact role of the merchant in the payment card
industry to describe:
 why it stores, processes and transmits cardholder data
 how payments are processed
 what payment mediums does it use for transmitting the data
 any other businesses that they are connected to, regarding the processing and transmission of
data
The executive summary must also include a comprehensive network topological diagram to explain:
 All connections going in and out of the network
 Important devices including point-of-sale devices, web servers, databases, etc.
Section 2: Description of Scope of Work and Approach Taken
In this section the assessor has to validate the accuracy of the scope and include the following details:
 All the processes involved in the identification and documentation of cardholder data
 Evaluation and documentation of results
 Proof of verification of the effectiveness of the methods adopted for assessing
 Validation of accuracy and appropriateness of the scope of assessment
 The main focus area of the assessment
 Explanation of the network segmentation process , if used for reducing scope
In case if sampling is used by the assessor, the following details of the sample set must be included:
 Total population
 Sampling size
 Sampling methodology
The assessor must also include any entity involved in storing, processing or transmitting cardholder data
that was excluded from the scope of work and the reason why it was excluded.
Section 3: Details about Reviewed Environment
Following important details must be documented in the section:
 All communication link diagrams, such as LAN and WAN
 Complete description of cardholder data environment or CDE
 List of tables and files that store cardholder data
 Methods adopted for securing the data
 List of all software and hardware used in the CDE and a description of their functionality
 List of third party payment applications
 List of interviewed individuals, along with their details
 List of all reviewed documentation
Section 4: Contact Information and Report Date
This section should contain the following important details:
 Contact details of merchant and the assessor
 The time period or the duration of the assessment
 The date of report
Section 5: Quarterly Scan Results
Here, the assessor needs to summarize the four recent ASV scan results. However, in case of a few
exceptions, the assessor may not be required to complete these scans if they verify that:
 The recent scan was a passing one
 All policies and procedures of the organization have regulated a quarterly scan within the
organization
 Vulnerabilities detected in the last scan have been fixed
 Four passing scans on a quarterly basis were conducted after initial PCI DSS review
The scan must include all IP addresses that are accessible externally.
Section 6: Findings and Observations
In this important section the assessor needs to:
 use the PCI DSS Requirements and Security Assessment Procedure template to document the
findings on each requirement and sub-requirement
 make sure that all “not applicable” areas are well explained
 review and document all compensating controls, if used
Compensating Controls Worksheets (if applicable)
In this section, the assessor needs to attach compensating controls worksheets in an appendix. He has
to give each compensating control a uniquely identifying appendix number. (For example, if
Compensating Controls Worksheets are in Appendix A of the ROC, uniquely identify each worksheet as
A-1, A-2, etc.) The compensating controls worksheets should follow the template given in appendix C of
the PCI DSS Requirements and Security Assessment Procedures.
To summarize it all, in sections 1 to 5, the assessor has to assess the environment by first determining
the scope of compliance and what approach is taken to achieve compliance against every requirement.
The details of the environment reviewed are then provided by the assessor. The section 6, which
includes the Findings and Observations, pertains to all requirements of the PCI DSS as well as additional
requirements for Shared Hosting Providers. These findings need to be in consistence with the section 1-
5 of the report. In the end, a complete worksheet for all the compensating controls for each
requirement should be provided, the template of which can be obtained from appendices B and C of the
PCI DSS.
A comprehensive and reliable report on compliance can only be achieved with the work papers
generated by the assessor if he exercises detailed tests and assessments. These work papers are
produced at every stage of assessment such as observations, configuration data, system testing,
interview notes, references, etc. It would not be wrong to say that the RoC is actually a summary of all
the work papers produced during each assessment activity.

More Related Content

PDF
PCI DSS: What it is, and why you should care
PPTX
PCI Compliance - Delving Deeper In The Standard
PDF
How to Prepare for a PCI DSS Audit
PDF
Understanding Your PCI DSS Guidelines: Successes and Failures
PDF
PCI-DSS for IDRBT
PPTX
Chapter 15: PCI Compliance for Merchants
PDF
Reduce PCI Scope - Maximise Conversion - Whitepaper
PDF
Comprehensive SOC 1 and SOC 2 Reporting for Enhanced Compliance and Security
PCI DSS: What it is, and why you should care
PCI Compliance - Delving Deeper In The Standard
How to Prepare for a PCI DSS Audit
Understanding Your PCI DSS Guidelines: Successes and Failures
PCI-DSS for IDRBT
Chapter 15: PCI Compliance for Merchants
Reduce PCI Scope - Maximise Conversion - Whitepaper
Comprehensive SOC 1 and SOC 2 Reporting for Enhanced Compliance and Security

Similar to How to Report on your PCI DSS Compliance.docx (20)

PPTX
Payment Card Acceptance PCI Compliance for Local Governments 2012
PDF
PCI-DSS_Overview
PDF
Verizon 2014 PCI Compliance Report
PDF
Verizon 2014 pci compliance report
PDF
Pci dss scoping and segmentation with links converted-converted
PPTX
Securing Your Customers' Credit Card Information
PPTX
PCI Compliance for Community Colleges @One CISOA 2011
PPTX
SFISSA - PCI DSS 3.0 - A QSA Perspective
PPTX
Payment Card Industry Introduction CMTA APR 2010
PPT
Merchant Services Audit 03 2011
PPTX
Secrets for Successful Regulatory Compliance Projects
PDF
PCI_Presentation_OASIS
DOCX
Online_Transactions_PCI
PPTX
Making Compliance Business as Usual
PPTX
Payment Card Industry CMTA NOV 2010
PDF
Adventures in PCI Wonderland
PPT
pci-comp pci requirements and controls.ppt
PPTX
PCI DSS Business as Usual (BAU)
PDF
Data Center Audit Standards
PPTX
PCI DSS 3.0: Don’t Shortchange Your PCI Readiness
Payment Card Acceptance PCI Compliance for Local Governments 2012
PCI-DSS_Overview
Verizon 2014 PCI Compliance Report
Verizon 2014 pci compliance report
Pci dss scoping and segmentation with links converted-converted
Securing Your Customers' Credit Card Information
PCI Compliance for Community Colleges @One CISOA 2011
SFISSA - PCI DSS 3.0 - A QSA Perspective
Payment Card Industry Introduction CMTA APR 2010
Merchant Services Audit 03 2011
Secrets for Successful Regulatory Compliance Projects
PCI_Presentation_OASIS
Online_Transactions_PCI
Making Compliance Business as Usual
Payment Card Industry CMTA NOV 2010
Adventures in PCI Wonderland
pci-comp pci requirements and controls.ppt
PCI DSS Business as Usual (BAU)
Data Center Audit Standards
PCI DSS 3.0: Don’t Shortchange Your PCI Readiness
Ad

More from Christian James (6)

PDF
Vals thorens.pdf
DOCX
STUDY OF THE PIAZZA SAN MARCO
PDF
Proposal for Content Revamp from Existing Web Page Contents
PDF
KANA technical support.pdf
PDF
Health information system.pdf
DOCX
Boxing day.docx
Vals thorens.pdf
STUDY OF THE PIAZZA SAN MARCO
Proposal for Content Revamp from Existing Web Page Contents
KANA technical support.pdf
Health information system.pdf
Boxing day.docx
Ad

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
August Patch Tuesday
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Assigned Numbers - 2025 - Bluetooth® Document
Developing a website for English-speaking practice to English as a foreign la...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
August Patch Tuesday
Web App vs Mobile App What Should You Build First.pdf
DP Operators-handbook-extract for the Mautical Institute
Module 1.ppt Iot fundamentals and Architecture
Getting started with AI Agents and Multi-Agent Systems
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Programs and apps: productivity, graphics, security and other tools
OMC Textile Division Presentation 2021.pptx
Chapter 5: Probability Theory and Statistics
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Tartificialntelligence_presentation.pptx
observCloud-Native Containerability and monitoring.pptx
Hindi spoken digit analysis for native and non-native speakers
A comparative study of natural language inference in Swahili using monolingua...
O2C Customer Invoices to Receipt V15A.pptx
NewMind AI Weekly Chronicles - August'25-Week II

How to Report on your PCI DSS Compliance.docx

  • 1. How to Report on your PCI DSS Compliance The Payment Card Industry – Data Security Standard (PCI DSS) is a set of requirements for merchants and financial institutions, which helps them keep their cardholder data safe and secure. Once all requirements to achieve PCI DSS compliance have been met, an organization needs to deliver a Report on Compliance (RoC). The RoC is prepared at the time of the assessment of PCI compliance and comprehensively provides details about the assessment approach and compliance standing against each PCI DSS requirement. The PCI Security Standards Council (SSC) has provided a template for a Report on Compliance in its PCI DSS Requirements and Security Assessment Procedures. What is a Report on Compliance A Report on Compliance or ROC is basically a form that needs to be filled by Level 1 Visa merchants who are in the process of undergoing PCI DSS audit. Level 1 merchants are those merchants who carry out more than six million Visa transactions in one business year. Purpose of Report on Compliance The purpose of RoC is the verification of the merchant in terms of its compliance with the PCI Data Security Standard. This standard, which was formed with the collaboration of Master Card, Visa, American Express and Discover, has laid down some requirements based upon a set of policies and procedures to protect cardholder data from any potential fraud or information misuse. The PCI DSS Report on Compliance is mostly prepared by a Quality Security Assessor who performs the compliance audit. The QSA then must verify and prove the methodology of performing the validation as well as the measuring of every entity against each requirement of the standard. This RoC is then submitted to the bank of the merchant so that it can be accepted. The bank, after accepting the RoC, further forwards it to Visa to verify for compliance. Contents of your PCI DSS Compliance Report According to the PCI DSS Requirements and Security Assessment Procedures document, RoC should consist of the following main contents. Section 1: Executive Summary In executive summary an assessor has to describe the exact role of the merchant in the payment card industry to describe:  why it stores, processes and transmits cardholder data  how payments are processed  what payment mediums does it use for transmitting the data  any other businesses that they are connected to, regarding the processing and transmission of data
  • 2. The executive summary must also include a comprehensive network topological diagram to explain:  All connections going in and out of the network  Important devices including point-of-sale devices, web servers, databases, etc. Section 2: Description of Scope of Work and Approach Taken In this section the assessor has to validate the accuracy of the scope and include the following details:  All the processes involved in the identification and documentation of cardholder data  Evaluation and documentation of results  Proof of verification of the effectiveness of the methods adopted for assessing  Validation of accuracy and appropriateness of the scope of assessment  The main focus area of the assessment  Explanation of the network segmentation process , if used for reducing scope In case if sampling is used by the assessor, the following details of the sample set must be included:  Total population  Sampling size  Sampling methodology The assessor must also include any entity involved in storing, processing or transmitting cardholder data that was excluded from the scope of work and the reason why it was excluded. Section 3: Details about Reviewed Environment Following important details must be documented in the section:  All communication link diagrams, such as LAN and WAN  Complete description of cardholder data environment or CDE  List of tables and files that store cardholder data  Methods adopted for securing the data  List of all software and hardware used in the CDE and a description of their functionality  List of third party payment applications  List of interviewed individuals, along with their details  List of all reviewed documentation Section 4: Contact Information and Report Date This section should contain the following important details:  Contact details of merchant and the assessor  The time period or the duration of the assessment  The date of report
  • 3. Section 5: Quarterly Scan Results Here, the assessor needs to summarize the four recent ASV scan results. However, in case of a few exceptions, the assessor may not be required to complete these scans if they verify that:  The recent scan was a passing one  All policies and procedures of the organization have regulated a quarterly scan within the organization  Vulnerabilities detected in the last scan have been fixed  Four passing scans on a quarterly basis were conducted after initial PCI DSS review The scan must include all IP addresses that are accessible externally. Section 6: Findings and Observations In this important section the assessor needs to:  use the PCI DSS Requirements and Security Assessment Procedure template to document the findings on each requirement and sub-requirement  make sure that all “not applicable” areas are well explained  review and document all compensating controls, if used Compensating Controls Worksheets (if applicable) In this section, the assessor needs to attach compensating controls worksheets in an appendix. He has to give each compensating control a uniquely identifying appendix number. (For example, if Compensating Controls Worksheets are in Appendix A of the ROC, uniquely identify each worksheet as A-1, A-2, etc.) The compensating controls worksheets should follow the template given in appendix C of the PCI DSS Requirements and Security Assessment Procedures. To summarize it all, in sections 1 to 5, the assessor has to assess the environment by first determining the scope of compliance and what approach is taken to achieve compliance against every requirement. The details of the environment reviewed are then provided by the assessor. The section 6, which includes the Findings and Observations, pertains to all requirements of the PCI DSS as well as additional requirements for Shared Hosting Providers. These findings need to be in consistence with the section 1- 5 of the report. In the end, a complete worksheet for all the compensating controls for each requirement should be provided, the template of which can be obtained from appendices B and C of the PCI DSS. A comprehensive and reliable report on compliance can only be achieved with the work papers generated by the assessor if he exercises detailed tests and assessments. These work papers are produced at every stage of assessment such as observations, configuration data, system testing,
  • 4. interview notes, references, etc. It would not be wrong to say that the RoC is actually a summary of all the work papers produced during each assessment activity.