PCI DSS Compliance for E-Commerce and Fintech in India: Guide

Dhanush Prabha
10 min read 77.3K views

PCI DSS compliance in India is mandatory for every business that stores, processes, or transmits credit card, debit card, or prepaid card data. The Payment Card Industry Data Security Standard (PCI DSS) is a global security framework enforced by Visa, Mastercard, RuPay, and other card networks. For Indian e-commerce businesses, fintech companies, and payment service providers, non-compliance means fines up to $100,000 per month, loss of card acceptance privileges, and full liability for data breach losses. With PCI DSS version 4.0 now fully enforced since March 31, 2025, and RBI tightening digital payment security requirements, the compliance bar has moved higher. This guide covers the 12 PCI DSS requirements, the 4 compliance levels, SAQ types, certification costs in India, and how Indian regulations intersect with PCI standards.

  • PCI DSS applies to all Indian businesses handling card payments, from small e-commerce stores to large fintech platforms
  • 12 security requirements are organized into 6 goals covering network security, data protection, vulnerability management, access control, monitoring, and security policy
  • Compliance levels (1 to 4) are determined by annual card transaction volume; Level 4 SAQ costs ₹50,000 to ₹3 lakh while Level 1 QSA audit costs ₹10 lakh to ₹30 lakh
  • PCI DSS v4.0 is fully enforced from March 31, 2025, with new requirements for multi-factor authentication, e-commerce skimming prevention, and customized validation
  • RBI mandates security audits for payment aggregators and gateways under its 2020 and 2021 guidelines, referencing PCI DSS-equivalent standards
  • Using a payment gateway reduces PCI DSS scope but does not eliminate compliance obligations entirely

What is PCI DSS?

PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards created by the PCI Security Standards Council (PCI SSC) to protect cardholder data during and after financial transactions. The PCI SSC was founded in 2006 by five major card brands: Visa, Mastercard, American Express, Discover, and JCB. Any organization worldwide that accepts, processes, stores, or transmits payment card information must comply with PCI DSS, regardless of size or transaction volume.

The standard is not a law passed by any government. It is a contractual requirement imposed by the card networks through acquiring banks. When a merchant signs a card acceptance agreement with a bank, that agreement includes a clause requiring PCI DSS compliance. Violate it, and the card brands can fine the acquiring bank, which passes those fines directly to the merchant, sometimes with additional charges. In practice, this contractual enforcement mechanism is more effective than most government regulations because it hits where it hurts: the ability to accept card payments at all.

PCI DSS v4.0 is maintained by the PCI Security Standards Council (PCI SSC) at www.pcisecuritystandards.org. In India, the Reserve Bank of India mandates equivalent payment security controls through its Master Directions on Digital Payment Security Controls (2021) and the Payment and Settlement Systems Act, 2007.

PCI DSS 4.0: What Changed and Why It Matters

PCI DSS version 4.0 replaced the long-standing version 3.2.1. Released in March 2022, version 4.0 had a transition period where both versions were accepted. That transition ended on March 31, 2024, making v4.0 the only active standard. A second set of future-dated requirements became mandatory on March 31, 2025. If your business validated compliance against v3.2.1 and has not updated, you are no longer compliant.

The biggest shift in v4.0 is philosophical. Previous versions followed a rigid, checklist-based approach: do exactly this, in exactly this way. Version 4.0 introduces a customized approach alongside the traditional defined approach. The customized approach lets organizations meet the security objective of each requirement using alternative controls, as long as they can prove the alternative achieves the same level of protection. This is a significant change for mature security teams that have controls exceeding the minimum but structured differently than the standard prescribed.

Key Changes in PCI DSS 4.0

AreaPCI DSS 3.2.1PCI DSS 4.0
Validation ApproachDefined approach onlyDefined approach + Customized approach
Multi-Factor AuthenticationRequired for remote access onlyRequired for all access to cardholder data environment
EncryptionRequired for public network transmissionRequired for both public and internal network transmission
E-Commerce SecurityBasic web application protectionAutomated scripts detection to prevent skimming attacks
Risk AssessmentsAnnual risk assessmentTargeted risk analysis for each applicable requirement
Password RequirementsMinimum 7 charactersMinimum 12 characters (or 8 if system cannot support 12)
Security AwarenessAnnual trainingTraining must include phishing and social engineering awareness
Log ReviewsDaily log reviewAutomated mechanism to detect and alert on anomalies

All future-dated requirements in PCI DSS v4.0 became mandatory on March 31, 2025. If your last assessment was against v3.2.1, you must complete a new assessment against v4.0 immediately. Continued use of v3.2.1 assessments is not accepted by any card brand.

The 12 PCI DSS Requirements (Organized by 6 Goals)

The 12 PCI DSS requirements are the core of the standard. They are organized into 6 broad security goals, each containing 2 requirements. Every business handling card data must address all 12, though the depth of implementation varies by compliance level and the specific SAQ applicable to your business model. Understanding the structure helps you plan your compliance roadmap and budget effectively.

GoalReq #RequirementWhat It Means in Practice
Build and Maintain a Secure Network and Systems1Install and maintain network security controlsConfigure firewalls and network segmentation to isolate cardholder data environment
2Apply secure configurations to all system componentsChange all vendor-supplied default passwords, remove unnecessary services and protocols
Protect Account Data3Protect stored account dataEncrypt stored cardholder data, mask PAN when displayed, implement data retention limits
4Protect cardholder data with strong cryptography during transmissionUse TLS 1.2+ for all data in transit over public and internal networks
Maintain a Vulnerability Management Program5Protect all systems and networks from malicious softwareDeploy anti-malware on all systems, keep definitions current, perform periodic scans
6Develop and maintain secure systems and softwarePatch vulnerabilities within defined timelines, follow secure coding practices, review custom code
Implement Strong Access Control Measures7Restrict access to system components and cardholder data by business need to knowRole-based access control; no access to card data unless job function requires it
8Identify users and authenticate access to system componentsUnique user IDs for all personnel, multi-factor authentication for CDE access, minimum 12-character passwords
9Restrict physical access to cardholder dataPhysical access controls for data centers, secure destruction of media containing card data
Regularly Monitor and Test Networks10Log and monitor all access to system components and cardholder dataCentralized logging with automated alert mechanisms, daily log reviews, 12-month log retention
11Test security of systems and networks regularlyQuarterly ASV scans, annual penetration testing, wireless access point detection
Maintain an Information Security Policy12Support information security with organizational policies and programsDocumented security policy reviewed annually, security awareness training, incident response plan

For e-commerce businesses in India, Requirements 6 (secure coding) and 11 (regular testing) tend to demand the most effort. Payment page scripts, third-party integrations, and API endpoints all fall under these requirements. If your Pvt Ltd company runs an online store, these two requirements will likely consume the largest share of your PCI DSS compliance budget.

Start with ISO 27001 for Your Security Foundation

ISO 27001 certification covers 60% to 70% of PCI DSS security controls. Build your information security management system first, then layer PCI DSS-specific requirements on top. Starting at ₹15,000.

Get ISO 27001 Certification

PCI DSS Compliance Levels: Which One Applies to You?

Your PCI DSS compliance level determines how you validate compliance: through a Self-Assessment Questionnaire (SAQ) or a full Qualified Security Assessor (QSA) audit. The level is based on your annual volume of card transactions across all channels (online, in-store, phone orders). Card brands define the thresholds, and your acquiring bank assigns the level based on your reported transaction volume.

LevelAnnual Card TransactionsValidation MethodEstimated Cost (India)
Level 1Over 6 millionAnnual on-site QSA audit + quarterly ASV scan₹10 lakh to ₹30 lakh
Level 21 million to 6 millionAnnual SAQ + quarterly ASV scan₹3 lakh to ₹8 lakh
Level 320,000 to 1 million (e-commerce)Annual SAQ + quarterly ASV scan₹1.5 lakh to ₹5 lakh
Level 4Fewer than 20,000 (e-commerce) or up to 1 million (total)Annual SAQ + quarterly ASV scan (recommended)₹50,000 to ₹3 lakh

Most Indian e-commerce startups and small businesses fall under Level 4. If your D2C brand processes 500 card transactions a month, you are firmly in Level 4 territory. Do not let the word "compliance" intimidate you into thinking this requires a six-figure expenditure. Level 4 compliance through SAQ A (if you fully outsource payment handling) is the most straightforward path and can be completed in 4 to 8 weeks.

Large payment aggregators, fintech companies processing millions of transactions, and banking institutions fall under Level 1, which requires a full on-site assessment by a QSA. This is the most rigorous and expensive validation method, but it is proportionate to the risk these organizations carry.

Based on our experience helping businesses with compliance certifications, the most common mistake is over-classifying your compliance level. A Level 4 merchant completing SAQ D (the most comprehensive questionnaire) when SAQ A would suffice wastes ₹2 lakh to ₹5 lakh in unnecessary assessment costs. Confirm your SAQ type with your acquiring bank before starting the compliance process.

Who Needs PCI DSS Compliance in India?

The simple rule: if your business touches card data at any point, PCI DSS applies. "Touching" includes storing card numbers in a database, processing card transactions through your server, transmitting card data to a payment processor, or even having a web page where a customer types their card number, even if it is in an iframe hosted by the payment gateway.

E-Commerce Businesses

Every online store that accepts card payments needs PCI DSS compliance. This includes Private Limited Companies running D2C websites, marketplace sellers using custom payment integrations, subscription-based services charging cards monthly, and SaaS platforms billing with stored card credentials. If you use a hosted payment page (Razorpay, PayU, or CCAvenue checkout page), your scope is reduced to SAQ A, but compliance is still required. If your site has a custom-built payment form that touches card numbers before sending them to the processor, you are looking at SAQ D and a significantly larger compliance burden.

Fintech Companies and Payment Aggregators

Payment gateways, payment aggregators, lending platforms that disburse to cards, and any fintech that processes or stores card data must comply. RBI's guidelines for Payment Aggregators and Payment Gateways (released in 2020, updated in 2024) explicitly require these entities to undergo annual security audits, and PCI DSS is the recognized standard for card-related security. Most fintech companies processing over 6 million transactions annually fall under Level 1, requiring a full QSA audit.

Banks and NBFCs

Card-issuing banks, acquiring banks, and NBFCs offering card-based products (credit cards, prepaid cards) are subject to PCI DSS as both issuers and acquirers. RBI mandates additional security requirements for these entities under its Master Directions on Digital Payment Security Controls.

POS Terminal Operators and Retailers

Physical retail businesses using POS (Point of Sale) terminals that accept card swipes, chip inserts, or contactless tap payments need PCI DSS compliance. The specific SAQ depends on the terminal type and integration model. Standalone terminals from PCI-validated providers have the simplest compliance path (SAQ B), while integrated POS systems connected to business networks require SAQ C or D.

Many Indian e-commerce businesses assume that using Razorpay or PayU means they have zero PCI DSS obligations. This is incorrect. While the payment gateway handles card data processing, your website still needs to comply with specific requirements covering how the payment page is loaded, how scripts are managed, and how access to your administrative systems is controlled. The scope is reduced, not eliminated.

Self-Assessment Questionnaire (SAQ) Types

The SAQ is how most Indian businesses validate PCI DSS compliance. Instead of paying ₹10 lakh or more for a QSA audit, Level 2 to 4 merchants complete the appropriate SAQ, which is a structured questionnaire covering the PCI DSS requirements applicable to their specific card data handling model. Picking the right SAQ saves time, money, and frustration. Picking the wrong one means either answering questions that do not apply to you or, worse, missing requirements that do.

SAQ TypeApplies ToCard Data HandlingNumber of Requirements
SAQ AE-commerce merchants using fully hosted payment page (redirect or iframe)No direct contact with card data; all processing by PCI-compliant third party22 questions
SAQ A-EPE-commerce merchants whose website controls the payment page delivery but does not receive card dataWebsite elements affect payment page security; card data goes directly to processor139 questions
SAQ BMerchants using standalone dial-out POS terminals (no electronic card data storage)Imprint-only or standalone terminal; no electronic cardholder data storage41 questions
SAQ CMerchants with payment application systems connected to the internetPayment application processes card data but business does not store it electronically160 questions
SAQ D (Merchant)All merchants not qualifying for SAQ A, A-EP, B, or CStores, processes, or transmits cardholder data on own systems329 questions
SAQ D (Service Provider)Service providers handling cardholder dataStores, processes, or transmits cardholder data on behalf of other entities345 questions

For most Indian e-commerce businesses using Razorpay, PayU, CCAvenue, or Cashfree with a hosted checkout or redirect model, SAQ A is the correct choice. It has the fewest questions (22) and the lowest compliance cost. The moment your website has JavaScript that can affect the payment page or your server-side code touches card data before sending it to the processor, you move to SAQ A-EP or SAQ D, and the compliance effort multiplies by 5x to 10x.

Ensure Your Business Compliance is Up to Date

PCI DSS is one part of your overall compliance responsibilities. From annual filings to security certifications, IncorpX handles your complete compliance calendar.

View Compliance Services

PCI DSS Certification Process in India

PCI DSS is technically a validation, not a certification (you cannot get a "PCI DSS certificate" in the way you get an ISO certificate). However, the industry commonly uses the term "certification" to refer to successfully completing the validation process. Here is the step-by-step process for both SAQ and QSA paths.

Step 1: Determine Your Compliance Level and SAQ Type

Contact your acquiring bank to confirm your compliance level based on annual transaction volume. Identify the applicable SAQ type based on how your business handles card data. If you are unsure whether your integration model qualifies for SAQ A or requires SAQ A-EP, your payment gateway provider or a PCI consultant can help make the determination.

Step 2: Define Your Cardholder Data Environment (CDE)

Map every system, network segment, application, and process that stores, processes, or transmits cardholder data. Include all connected systems that could impact the CDE's security. This scoping exercise is critical because it determines which systems must meet PCI DSS requirements. Poor scoping is the number one reason compliance projects go over budget.

Step 3: Conduct a Gap Analysis

Compare your current security controls against the applicable PCI DSS requirements. Document gaps between what you have and what the standard requires. For Level 4 merchants on SAQ A, this gap analysis is typically straightforward (1 to 2 weeks). For Level 1 organizations heading into a QSA audit, the gap analysis phase takes 4 to 8 weeks and often reveals deficiencies in logging, access control, and encryption practices.

Step 4: Remediate Identified Gaps

Fix the gaps found in Step 3. Common remediation activities include upgrading TLS versions, implementing multi-factor authentication, deploying file integrity monitoring, establishing formal security policies and procedures, configuring centralized logging, and setting up an incident response plan. Remediation is where most of the budget goes, especially for Level 1 organizations.

Step 5: Complete the SAQ or QSA Assessment

For Levels 2 to 4: Complete the applicable SAQ honestly, attach supporting evidence, and submit it along with an Attestation of Compliance (AOC) to your acquiring bank. For Level 1: Schedule the on-site QSA assessment. The QSA will review policies, inspect systems, interview staff, test controls, and produce a Report on Compliance (ROC). A typical Level 1 QSA on-site assessment takes 5 to 15 working days.

Step 6: Complete Quarterly ASV Scans

Engage an Approved Scanning Vendor to perform external vulnerability scans on your internet-facing systems. Scans must be completed quarterly and produce a passing result. If the scan identifies vulnerabilities, remediate them and re-scan until the result is clean. ASV scans are required for all compliance levels.

Step 7: Submit Compliance Documentation

Submit your completed SAQ and AOC (or ROC and AOC for Level 1) to your acquiring bank and, if required, directly to the card brands. Maintain all compliance evidence for at least 12 months as it will be needed during the next annual validation cycle.

Based on our experience with compliance projects, the single most effective way to accelerate PCI DSS validation is to minimize your scope. If you are an e-commerce business, use a hosted payment page and qualify for SAQ A. If you are a fintech, implement tokenization to reduce the number of systems in your CDE. Every system you remove from scope is one fewer system that needs firewalls, logging, access controls, and testing.

Cost of PCI DSS Compliance in India

PCI DSS compliance costs in India vary significantly based on your compliance level, current security maturity, and the complexity of your cardholder data environment. Here is a realistic breakdown based on current market rates from Indian QSA firms and security consultants.

Cost ComponentLevel 4 (SAQ A)Level 4 (SAQ D)Level 1 (QSA Audit)
Gap Analysis₹15,000 to ₹40,000₹50,000 to ₹1.5 lakh₹2 lakh to ₹5 lakh
Remediation (Security Controls)₹10,000 to ₹50,000₹1 lakh to ₹5 lakh₹3 lakh to ₹15 lakh
SAQ/QSA Assessment₹15,000 to ₹50,000₹1 lakh to ₹3 lakh₹5 lakh to ₹12 lakh
Quarterly ASV Scans (4 per year)₹20,000 to ₹60,000₹40,000 to ₹1 lakh₹60,000 to ₹2 lakh
Annual Penetration TestingNot required for SAQ A₹1 lakh to ₹3 lakh₹2 lakh to ₹5 lakh
Total (Year 1)₹50,000 to ₹2 lakh₹3 lakh to ₹13 lakh₹10 lakh to ₹30 lakh+
Annual Renewal (Year 2+)₹30,000 to ₹1 lakh₹2 lakh to ₹8 lakh₹6 lakh to ₹18 lakh

The cost difference between SAQ A and SAQ D for a Level 4 merchant is stark: ₹50,000 versus ₹3 lakh or more. This is precisely why scope reduction matters so much. Moving from a custom payment integration (SAQ D) to a hosted checkout page (SAQ A) can save a small e-commerce business ₹2 lakh to ₹10 lakh annually. For fintech companies at Level 1, the QSA audit cost is a significant line item, but the alternative (non-compliance fines of $5,000 to $100,000 per month) makes the investment straightforward.

Businesses that already hold ISO 27001 certification typically save 30% to 40% on PCI DSS compliance costs because many security controls (access management, logging, incident response, risk assessment) overlap between the two standards. If you are planning both certifications, pursuing ISO 27001 first is the more cost-effective sequence.

PCI DSS vs ISO 27001: How They Compare

PCI DSS and ISO 27001 are the two security standards Indian businesses encounter most frequently. They are not competitors; they complement each other. But understanding the differences helps you decide which to pursue first and how to budget for both.

ParameterPCI DSSISO 27001
ScopeCardholder data onlyAll information assets
Mandated ByCard brands (Visa, Mastercard, RuPay)Voluntary (client/market driven)
Framework TypePrescriptive (12 specific requirements)Risk-based (Annex A controls selected based on risk assessment)
Certification BodyQSA (for Level 1) or self-assessmentAccredited certification body (e.g., BSI, TUV, Bureau Veritas)
Renewal CycleAnnual validation + quarterly scans3-year certification with annual surveillance audits
Number of Controls12 requirements with 250+ sub-requirements93 controls in Annex A (ISO 27001:2022)
Cost in India₹50,000 to ₹30 lakh (depending on level)₹1.5 lakh to ₹10 lakh (depending on organization size)
Government RecognitionReferenced by RBI for payment entitiesRecognized by CERT-In, MeitY, SEBI, and government procurement
OverlapCovers network security, access control, encryption, logging, policyCovers the same areas but in a broader context for all data types
Best ForBusinesses handling card paymentsAll businesses wanting a formal information security framework

The practical overlap between PCI DSS and ISO 27001 is roughly 60% to 70%. Access control, logging and monitoring, encryption, incident response, risk assessment, and security policy requirements exist in both standards. If you implement ISO 27001 first, a significant portion of PCI DSS requirements are already addressed. The remaining PCI DSS-specific items (cardholder data masking, PAN storage rules, ASV scans, specific authentication requirements) are then layered on top as targeted additions rather than built from scratch.

Build Your Security Framework with ISO 27001

ISO 27001 forms the foundation for PCI DSS, SOC 2, and HIPAA compliance. One certification, multiple compliance benefits. IncorpX provides end-to-end ISO certification services.

Start ISO Certification

Indian Regulatory Context: RBI and Payment Security

PCI DSS exists as a global card industry standard, but Indian businesses must also understand the domestic regulatory layer. The Reserve Bank of India has issued multiple directives on digital payment security that intersect with, supplement, and in some cases go beyond PCI DSS requirements.

RBI Master Directions on Digital Payment Security Controls (2021)

Issued in February 2021, these directions apply to all regulated entities (banks, NBFCs, payment system operators) that offer digital payment products. The Master Directions require a board-approved information security policy, regular security audits by CERT-In empanelled auditors, incident reporting to RBI within 6 hours of detection, and controls for mobile banking, internet banking, and card-based transactions. While the directions do not name PCI DSS explicitly, the security control requirements for card-based transactions are equivalent to PCI DSS standards.

RBI Guidelines for Payment Aggregators and Payment Gateways (2020)

Released in March 2020 and updated subsequently, these guidelines mandate that payment aggregators obtain RBI authorization and maintain minimum net worth requirements (₹15 crore for existing PAs, ₹25 crore for new applicants). Security requirements include PCI DSS compliance (explicitly referenced), annual security audits by CERT-In empanelled auditors, data storage only in India, and implementation of a comprehensive information security policy. Payment gateways, while not directly regulated under this framework, are required to follow equivalent security standards by their partner payment aggregators.

Payment and Settlement Systems Act, 2007 (PSS Act)

The PSS Act is the primary legislation governing payment systems in India. It gives RBI the authority to authorize and regulate payment system operators. Under the PSS Act, RBI can issue directions to any system participant regarding technology standards, security controls, and operational requirements. Non-compliance with RBI directions issued under the PSS Act can result in authorization revocation, fines, and criminal penalties.

Card-on-File Tokenization (RBI Circular, 2022)

RBI mandated that merchants cannot store actual card data (card-on-file) from October 1, 2022 onwards. All stored card data must be replaced with tokens issued by the card network. This directive directly reduces PCI DSS scope for merchants because tokenized data is not considered cardholder data under PCI DSS. If your business implemented RBI's tokenization mandate, your PCI DSS compliance burden is already lighter than it was before October 2022.

For e-commerce businesses that also need GST registration, note that the same compliance infrastructure (documented policies, audit trails, access controls) that supports PCI DSS also helps during GST audits where digital record integrity is evaluated. Building compliance systems with a unified approach saves effort across multiple regulatory obligations.

Common PCI DSS Compliance Mistakes

Compliance failures rarely happen because a business deliberately ignored security. They happen because of misunderstandings, shortcuts, and overlooked details. Here are the mistakes that Indian businesses make most frequently during PCI DSS compliance, along with how to avoid each one.

  • Choosing the wrong SAQ type: A merchant using a JavaScript-based payment form on their own domain selects SAQ A instead of SAQ A-EP. The result: an incomplete assessment that does not cover the actual risks. Always confirm your SAQ type with your acquiring bank and payment gateway provider before starting the assessment
  • Ignoring scope creep: Your CDE was well-defined 12 months ago. Since then, the development team added a new API endpoint, connected a CRM to the payment database, and gave the marketing team access to transaction reports. Each change potentially expanded your PCI DSS scope without anyone notifying the compliance team. Quarterly scope reviews are essential
  • Treating compliance as an annual event: PCI DSS is a continuous obligation. The quarterly ASV scans, daily log reviews, and ongoing access control management are requirements that must be maintained year-round, not just during the annual assessment period. Organizations that "go dark" between assessments face painful catch-up periods and frequent failures
  • Default credentials on internal systems: Requirement 2 specifically mandates changing all vendor-supplied defaults. Database admin passwords left at "admin123," default SNMP community strings, and factory-set router passwords are findings that appear in nearly 40% of first-time QSA audits
  • Inadequate logging: Requirement 10 requires logging of all access to cardholder data, with automated anomaly detection and 12-month retention. Many businesses have logging enabled but do not review logs, do not alert on anomalies, and do not retain logs for the required duration. This is a frequent assessment failure point
  • Skipping the internal vulnerability scan: External ASV scans are well-known, but Requirement 11 also requires internal vulnerability scans quarterly. Internal scans are often skipped or deprioritized because they are not submitted to the acquiring bank, but a QSA will check for them during a Level 1 audit
  • No incident response plan: Requirement 12 requires a documented incident response plan that is tested at least annually. "We'll figure it out when it happens" is not a plan. The response plan must include specific roles, communication procedures, containment steps, evidence preservation, and notification timelines
  • Not updating for PCI DSS 4.0: Organizations that validated against v3.2.1 and have not updated their controls for v4.0 requirements (enhanced MFA, e-commerce script monitoring, 12-character passwords, targeted risk analysis) are no longer compliant. The v4.0 future-dated requirements became mandatory on March 31, 2025

Based on our experience advising businesses on security compliance, the most cost-effective approach for Indian startups and SMEs is a three-layer strategy: first, minimize PCI DSS scope by using hosted payment pages and tokenization; second, build foundational security through ISO 27001; and third, complete PCI DSS validation against the reduced scope. This sequence typically reduces total compliance costs by 30% to 50% compared to attempting PCI DSS alone without scope reduction.

PCI DSS Compliance Checklist for Indian Businesses

Whether you are a Startup India-registered company launching your first e-commerce product or an established fintech firm processing millions of transactions, this checklist covers the essential steps for PCI DSS compliance in India.

  1. Confirm compliance level: Verify with your acquiring bank whether you are Level 1, 2, 3, or 4 based on your annual card transaction volume
  2. Identify your SAQ type: Map your payment integration model to the correct SAQ (A, A-EP, B, C, or D). If in doubt, consult your payment gateway provider
  3. Define your CDE scope: Document every system, network segment, application, and process that touches cardholder data, plus all connected systems
  4. Conduct a gap analysis: Compare your current controls against the PCI DSS requirements applicable to your SAQ type. Document every gap
  5. Remediate gaps: Implement required security controls: firewalls, encryption, MFA, access controls, logging, anti-malware, and secure coding practices
  6. Draft required documentation: Information security policy, data retention policy, incident response plan, network diagrams, and access control procedures
  7. Train staff: Security awareness training covering phishing, social engineering, password hygiene, and data handling procedures. Document the training
  8. Engage an ASV: Schedule your first quarterly external vulnerability scan and remediate any findings
  9. Complete the SAQ or schedule QSA audit: Fill out the SAQ with supporting evidence, or coordinate the on-site QSA assessment for Level 1
  10. Submit AOC/ROC to acquiring bank: Provide your Attestation of Compliance (and ROC for Level 1) to your acquiring bank and card brands as required
  11. Establish ongoing compliance processes: Quarterly ASV scans, annual penetration testing, continuous log monitoring, regular access reviews, and annual reassessment

Summary

PCI DSS compliance in India is a non-negotiable requirement for any business that accepts card payments. The 12 requirements across 6 security goals provide a comprehensive framework for protecting cardholder data, and PCI DSS v4.0 has raised the bar with stronger authentication, expanded encryption, and enhanced e-commerce protections. For most Indian e-commerce businesses and startups at Level 4, compliance through SAQ A costs ₹50,000 to ₹2 lakh and takes 4 to 8 weeks. For Level 1 fintech firms and payment aggregators, the QSA audit investment of ₹10 lakh to ₹30 lakh is a fraction of the potential non-compliance penalties. Start by reducing your PCI DSS scope through hosted payment pages and tokenization, build your security foundation with ISO 27001 certification, and then validate PCI DSS against the reduced scope. Your card data security is a business enabler, not just a compliance checkbox.

Secure Your Business with ISO 27001 Certification

ISO 27001 covers 60% to 70% of PCI DSS requirements and is recognized by RBI, SEBI, and enterprise clients. IncorpX provides end-to-end certification support starting at ₹15,000.

Get ISO 27001 Certified

Frequently Asked Questions

What is PCI DSS compliance?
PCI DSS (Payment Card Industry Data Security Standard) is a set of 12 security requirements that any organization handling credit card, debit card, or prepaid card data must follow. It is mandated by the PCI Security Standards Council (PCI SSC) and enforced by card brands like Visa, Mastercard, and RuPay.
Is PCI DSS compliance mandatory in India?
PCI DSS is not directly mandated by Indian law, but it is contractually required by all major card networks (Visa, Mastercard, RuPay) operating in India. Any merchant or service provider that stores, processes, or transmits cardholder data must comply. RBI also references payment security standards in its Master Directions on Digital Payments.
Who needs PCI DSS compliance in India?
PCI DSS applies to e-commerce websites, payment gateways, fintech companies, banks, NBFCs, POS terminal operators, payment aggregators, and any business that accepts card payments or handles cardholder data. Even if you outsource payment processing to a third-party gateway, you still have specific PCI DSS obligations.
What are the 4 PCI DSS compliance levels?
Compliance levels are based on annual card transaction volume. Level 1: over 6 million transactions (requires QSA audit). Level 2: 1 to 6 million. Level 3: 20,000 to 1 million e-commerce transactions. Level 4: fewer than 20,000 e-commerce or up to 1 million total transactions. Levels 2 to 4 use Self-Assessment Questionnaires.
What is PCI DSS version 4.0?
PCI DSS v4.0 was released in March 2022 by the PCI SSC. It replaced version 3.2.1, with a transition period ending on March 31, 2024. Future-dated requirements became mandatory on March 31, 2025. Version 4.0 introduces customized validation, stronger authentication, and expanded encryption requirements.
How much does PCI DSS compliance cost in India?
Costs vary by compliance level. Level 4 SAQ self-assessment costs ₹50,000 to ₹3 lakh, including gap analysis, remediation, and SAQ completion. Level 1 QSA audit ranges from ₹10 lakh to ₹30 lakh, including on-site assessment, penetration testing, and ASV scans. Annual renewal costs 40% to 60% of the initial assessment.
What is a Self-Assessment Questionnaire (SAQ) in PCI DSS?
An SAQ is a validation tool for merchants and service providers that are not required to undergo a full on-site QSA audit. There are multiple SAQ types (A, A-EP, B, B-IP, C, C-VT, D, P2PE) based on how the business handles cardholder data. Each SAQ has a different set of applicable PCI DSS requirements.
What is the difference between SAQ A and SAQ D?
SAQ A is for merchants that fully outsource all cardholder data processing to PCI DSS-compliant third parties and have no direct contact with card data. SAQ D is the most comprehensive questionnaire, covering all 12 PCI DSS requirements, required for merchants or service providers that store cardholder data on their own systems.
What is a Qualified Security Assessor (QSA)?
A QSA is an organization certified by the PCI SSC to conduct on-site PCI DSS assessments. QSAs evaluate a company's security controls, validate compliance, and issue a Report on Compliance (ROC). Level 1 merchants and all service providers processing, storing, or transmitting cardholder data are required to undergo a QSA audit annually.
What is an Approved Scanning Vendor (ASV)?
An ASV is a company certified by the PCI SSC to perform external vulnerability scans on internet-facing systems. Quarterly ASV scans are mandatory for all PCI DSS compliance levels. The scan checks for known vulnerabilities, open ports, and security misconfigurations in your public-facing network infrastructure.
What are the 12 PCI DSS requirements?
The 12 requirements are grouped into 6 goals: Build and Maintain a Secure Network (firewalls, no default passwords), Protect Cardholder Data (encryption, secure storage), Maintain a Vulnerability Management Program (anti-malware, secure software), Implement Strong Access Controls (restrict access, unique IDs, physical security), Monitor and Test Networks (logging, regular testing), and Maintain a Security Policy.
How is PCI DSS different from ISO 27001?
PCI DSS is specific to cardholder data protection with 12 mandatory requirements. ISO 27001 is a broader information security management standard covering all types of data. PCI DSS is mandated by card networks; ISO 27001 is voluntary but widely recognized. Many businesses pursue both since ISO 27001 provides foundational security controls that support PCI DSS compliance.
Does using a payment gateway remove PCI DSS obligations?
No. Using a third-party payment gateway reduces your PCI DSS scope but does not eliminate it completely. You still must complete an applicable SAQ (typically SAQ A or SAQ A-EP for e-commerce), ensure your website does not inadvertently capture card data, and maintain security controls for the parts of the transaction you control.
What happens if a business is not PCI DSS compliant?
Non-compliance consequences include fines of $5,000 to $100,000 per month imposed by card brands, higher transaction processing fees, potential termination of card acceptance privileges, liability for fraud losses if a data breach occurs, and reputational damage. In India, RBI can also direct payment aggregators to suspend operations for security non-compliance.
What is a Report on Compliance (ROC)?
A Report on Compliance is the formal document produced after a Level 1 QSA audit. It details the findings of the assessment, including which PCI DSS requirements are met, which have compensating controls, and any non-compliant areas. The ROC is submitted to the acquiring bank or card brand as proof of PCI DSS compliance.
How long does PCI DSS certification take in India?
Timeline depends on the compliance level and current security posture. Level 4 SAQ: 4 to 8 weeks for gap analysis, remediation, and SAQ completion. Level 1 QSA audit: 3 to 6 months, including preparation, remediation, on-site assessment, and ROC generation. Organizations with existing ISO 27001 certification typically complete PCI DSS faster.
What is the role of RBI in payment security compliance?
The Reserve Bank of India regulates payment security through its Master Directions on Digital Payment Security Controls (2021), guidelines for Payment Aggregators and Payment Gateways (2020), and the Payment and Settlement Systems Act, 2007 (PSS Act). RBI mandates security audits for payment aggregators and references PCI DSS-equivalent standards for entities handling card data.
Do startups and small e-commerce businesses need PCI DSS?
Yes. If your business accepts card payments online, even through an embedded payment form, you have PCI DSS obligations. Most small startups and e-commerce businesses fall under Level 4 and can comply using SAQ A or SAQ A-EP, which is the least expensive and least complex compliance path.
What are the key changes in PCI DSS 4.0 compared to 3.2.1?
Key changes include: customized approach as an alternative to the defined approach for meeting requirements, stronger multi-factor authentication for all access to cardholder data environments, expanded encryption requirements including for internal network transmission, targeted risk analysis replacing blanket compliance checklists, and enhanced requirements for e-commerce skimming prevention.
Can IncorpX help with PCI DSS compliance?
IncorpX provides ISO certification services including ISO 27001, which forms the foundational security management framework for PCI DSS compliance. Our team helps businesses with security audit preparation, compliance documentation, and connecting with certified QSA firms. Get started with ISO certification.
What is tokenization in the context of PCI DSS?
Tokenization replaces cardholder data (like a 16-digit card number) with a non-sensitive token that has no exploitable value. Tokenizing card data reduces PCI DSS scope because tokens are not considered cardholder data under the standard. RBI mandated card-on-file tokenization in India effective October 1, 2022.
How often must PCI DSS compliance be renewed?
PCI DSS compliance is validated annually. Level 1 organizations must undergo a QSA audit every year. Levels 2 to 4 must complete a new SAQ annually. Additionally, quarterly ASV scans and annual penetration tests are required for all levels. Compliance is not a one-time certification; it is a continuous obligation.
What is PCI DSS scope and how is it determined?
PCI DSS scope includes all system components, people, and processes that store, process, or transmit cardholder data, plus all systems connected to or that could impact the cardholder data environment (CDE). Reducing scope through network segmentation, tokenization, and outsourcing to PCI-compliant providers lowers compliance cost and complexity.
What documents are needed for PCI DSS compliance?
Required documentation includes: information security policy, network diagrams showing cardholder data flows, data retention and disposal policy, incident response plan, risk assessment documents, access control policies, change management procedures, and evidence of employee security awareness training. Level 1 organizations also need a completed ROC and AOC.
Is PCI DSS compliance required for UPI payments?
UPI payments do not involve cardholder data in the PCI DSS sense, so UPI-only merchants are not required to comply with PCI DSS. However, if your business accepts both UPI and card payments (credit/debit cards), PCI DSS applies to the card payment processing component. RBI has separate security guidelines for UPI transactions.
Tags:
Written by Dhanush Prabha

Dhanush Prabha is the Chief Technology Officer and Chief Marketing Officer at IncorpX, where he leads product engineering, platform architecture, and data-driven growth strategy. With over half a decade of experience in full-stack development, scalable systems design, and performance marketing, he oversees the technical infrastructure and digital acquisition channels that power IncorpX. Dhanush specializes in building high-performance web applications, SEO and AEO-optimized content frameworks, marketing automation pipelines, and conversion-focused user experiences. He has architected and deployed multiple SaaS platforms, API-first applications, and enterprise-grade systems from the ground up. His writing spans technology, business registration, startup strategy, and digital transformation - offering clear, research-backed insights drawn from hands-on engineering and growth leadership. He is passionate about helping founders and professionals make informed decisions through practical, real-world content.Dhanush Prabha is the Chief Technology Officer and Chief Marketing Officer at IncorpX, where he leads product engineering, platform architecture, and data-driven growth strategy. With over half a decade of experience in full-stack development, scalable systems design, and performance marketing, he oversees the technical infrastructure and digital acquisition channels that power IncorpX. Dhanush specializes in building high-performance web applications, SEO and AEO-optimized content frameworks, marketing automation pipelines, and conversion-focused user experiences. He has architected and deployed multiple SaaS platforms, API-first applications, and enterprise-grade systems from the ground up. His writing spans technology, business registration, startup strategy, and digital transformation - offering clear, research-backed insights drawn from hands-on engineering and growth leadership. He is passionate about helping founders and professionals make informed decisions through practical, real-world content.