PCI DSS is the most prescriptive framework in the Atlas — and the only one whose audit outcome turns on a definition. Get the Cardholder Data Environment right and the assessment is bounded; get it wrong and the boundary swallows your whole network. Every PCI strategy is, at its heart, a scoping strategy.
PCI is enforced through merchant agreements, not regulation. The card brands set the rules; the acquirers enforce them; QSAs validate compliance for the largest merchants. v4.0.1 (June 2024) clarified v4.0 and the future-dated requirements became mandatory March 31, 2025.
The CDE is a contagion. Once a system stores, processes, or transmits cardholder data, it's in scope. Worse — any system connected to that system is also in scope unless segmentation is in place. A poorly designed network can pull half the corporate environment into the CDE, doubling assessment cost and quadrupling remediation burden. Mature programs invest more in segmentation than in any other control category.
Tokenization is the cheat code. If you can replace cardholder data with a token early in your processing flow and never store, process, or transmit the original, you collapse most of your CDE. Stripe, Adyen, and Braintree have built billion-dollar businesses around this principle. The tradeoff: you depend on their PCI compliance and their tokenization architecture's correctness.
Service providers face stricter requirements than merchants. If you process payments on behalf of others (PSPs, acquirers, ISO/MSPs, hosting providers handling CHD), you must comply with additional requirements specifically for service providers — including more frequent segmentation testing (every 6 months vs annually), executive accountability for the program, and Service Provider AOC.
v4.0.1 made the future-dated requirements real. Released March 2024, mandatory March 2025: customized passwords (12+ chars), MFA on all CDE access (not just admin), authenticated vulnerability scanning, automated log review, anti-phishing controls (Req 5.4.1), payment page integrity monitoring (Req 6.4.3 + 11.6.1), and TRA documentation for many security controls. Programs still on v3.2.1 muscle memory are now non-compliant.
The prescription is the point. Where SOC 2 says "the entity restricts logical access" (CC6.1), PCI says "MFA must be implemented for all non-console administrative access into the CDE" (Req 8.4.1) and "MFA must be implemented for all access into the CDE" (Req 8.4.2 — added in v4.0). The shift from principle to specification is unmistakable. Defined Approach controls leave no room for interpretation; you either do exactly what's stated or you don't.
Customized Approach is genuinely new. Until v4.0, alternative controls only existed via Compensating Controls (Appendix C) — which required a documented business or technical reason why the requirement couldn't be met as written. Customized Approach is different: you can voluntarily design a different control that meets the same security objective. This unlocks innovation but adds documentation burden — every Customized Approach control requires its own Targeted Risk Analysis (TRA).
Requirement 12 is the largest and most-failed. Despite being labeled "information security policy," Req 12 covers risk assessment, TRA documentation, awareness training, incident response, vendor management, executive accountability, and several other governance topics. It's the requirement most likely to surface program-wide weaknesses during a QSA visit. Treat Req 12 as a meta-requirement that examines whether everything else is being managed.
The 2024–2025 transition reshaped programs. Future-dated requirements that became mandatory March 31, 2025 changed the day-to-day program for most merchants: MFA for all CDE access (not just admin), 12-character passwords (was 7), authenticated vulnerability scanning, automated log review (Req 10.4.1.1), payment page integrity monitoring (Req 6.4.3 + 11.6.1), and TRA documentation requirements throughout. Programs that "passed v3.2.1 with ease" are now finding v4.0.1 considerably harder.
Sample sizes are negotiable but bounded. Unlike SOX's prescribed sample sizes, PCI's testing procedures specify "examine a sample" or "observe processes" without numeric floors. QSAs use professional judgment — but firm policies and PCI SSC guidance establish typical floors: 25 for most population-based tests, 10–15 for less risky controls, and 100% for critical controls (e.g., privileged users, all firewall rules). Negotiate sample size at engagement start, not at draft RoC review.
IPE testing is mandatory but often skipped. Reports used as evidence — vulnerability scan reports, log review records, access matrices — must themselves be tested for completeness and accuracy. The QSA confirms how the report was generated, what filters or parameters were used, and whether the data matches the source system. Programs that submit "the screenshot from the dashboard" as evidence without provenance routinely fail this step.
TRA documentation became a separate work product in v4.0.1. Many sub-requirements that previously specified a fixed cadence ("monthly review of audit logs") now allow risk-based cadence ("at a frequency defined by the entity's TRA"). Each such control needs its own documented TRA: identifying the asset, threat, likelihood, impact, and resulting control frequency. Generic "we reviewed and decided weekly" TRAs are flagged. Real ones reference specific assets, specific threats, and the analytical reasoning.
Compensating Controls (Appendix C) are not the easy way out. A Compensating Control requires (a) a documented business or technical reason why the requirement can't be met as written, (b) an alternative that meets the same security objective, (c) a TRA showing the alternative is at least as effective, and (d) QSA validation. Most attempts at Compensating Controls fail because the "business reason" is actually "we didn't want to" — a reason QSAs reject. v4 narrowed this further; Customized Approach is now the preferred path for genuine alternatives.
| PCI requirement | SOX | SOC 2 (TSC) | ISO 27001:2022 | NIST CSF 2.0 | HIPAA | HITRUST v11 | Shared evidence |
|---|---|---|---|---|---|---|---|
| Req 1 — Network Sec | ITGC — Operations |
CC6.6 |
A.8.20 · A.8.22 |
PR.IR-01 |
§164.312(e)(1) |
09.m |
Firewall config, network diagram, segmentation tests |
| Req 2 — Secure Config | ITGC — Change |
CC6.6 · CC6.8 |
A.8.9 |
PR.PS-01 |
§164.312(a)(1) |
09.h · 10.b |
CIS benchmarks, hardening guides, drift detection |
| Req 3 — Stored Data | ITGC + BPC |
C1.1 · CC6.1 |
A.8.10 · A.8.11 · A.8.24 |
PR.DS-01 |
§164.312(a)(2)(iv) |
06.c · 10.f |
KMS config, encryption inventory, key rotation logs |
| Req 4 — Transmission | ITGC — Operations |
CC6.7 |
A.8.24 |
PR.DS-02 |
§164.312(e)(2)(ii) |
09.s |
TLS scan, cert inventory, VPN config |
| Req 5 — Anti-malware | ITGC — Operations |
CC6.8 |
A.8.7 |
PR.PS-05 |
§164.308(a)(5)(ii)(B) |
09.j |
EDR/AV deployment, scan logs, IOC alerts |
| Req 6 — Secure Dev | ITGC — SDLC |
CC8.1 |
A.8.25 – A.8.32 |
PR.PS-06 |
— | 10.a · 10.b |
SAST/DAST, code review, change tickets, pen test |
| Req 7 — Need-to-know | ITGC — Access |
CC6.1 · CC6.3 |
A.5.15 · A.8.2 · A.8.3 |
PR.AA-05 |
§164.308(a)(4) |
01.b · 01.v |
RBAC config, role definitions, access tickets |
| Req 8 — Authentication | ITGC — Access |
CC6.1 · CC6.2 |
A.5.16 · A.5.17 |
PR.AA-01 · PR.AA-03 |
§164.308(a)(3) · §164.312(a)(2)(i) |
01.b · 01.d |
MFA enforcement, password policy, IAM logs |
| Req 9 — Physical Access | ITGC — Operations |
CC6.4 |
A.7.1 – A.7.14 |
PR.AA-06 |
§164.310 |
08.b · 08.j |
Badge logs, CCTV, visitor records, POI inspections |
| Req 10 — Logging | ITGC — Operations |
CC7.1 · CC7.2 |
A.8.15 · A.8.16 |
DE.CM-01 |
§164.312(b) |
09.aa |
SIEM rules, log retention, automated review |
| Req 11 — Security Testing | ITGC — Operations |
CC7.1 |
A.8.8 |
ID.RA-01 |
§164.308(a)(1)(ii)(B) |
10.k · 10.m |
ASV scans, internal scans, pen test, segmentation test |
| Req 12 — Policy & Program | ELC · governance |
CC1.1 – CC9.2 |
Cl. 5 · A.5.1 · A.6.3 |
GV.PO · GV.RR |
§164.308(a)(1) – (8) |
02 · 03 · 05.k |
Policies, training records, IR plan, vendor mgmt, TRAs |
PCI is the most prescriptive framework in the Atlas, which means evidence built for PCI satisfies the others by default. If your firewall rules pass Req 1, they pass SOC 2 CC6.6 and ISO A.8.20. If your encryption passes Req 3, it passes HIPAA §164.312(a)(2)(iv) and ISO A.8.24. The crosswalk above shows clean one-to-many mappings — every PCI requirement maps to multiple controls in every other framework, and the PCI-level rigor exceeds what most other frameworks demand.
The asymmetry: PCI requires specific things (TLS 1.2+, AES-256, 12-character passwords, MFA on all CDE access). The other frameworks require that things — they care that encryption exists, not that it's AES-256. So PCI evidence over-satisfies, but you must explicitly document that fact in your other frameworks' work papers. Don't assume the SOC 2 auditor will infer your PCI controls cover their CC6.x.
The scope difference is the trap. SOX scopes to financial systems; SOC 2 to systems supporting the service description; HIPAA to systems handling ePHI; PCI to systems handling cardholder data. If your CDE is a small subset of your larger environment (which is the goal — that's the whole tokenization strategy), then PCI evidence covers only that subset. The CDE-only evidence does not satisfy the rest of your environment for SOC 2 or ISO 27001. You'll need to document scope deltas explicitly — and consider running broader controls programs that cover both CDE and non-CDE consistently.