Payment card information remains one of the most targeted forms of data. For Australian organisations that store, process or transmit cardholder data, PCI DSS compliance is a practical risk management requirement as much as a contractual one. The current standard, PCI DSS v4.0.1, came into full effect in 2024 and introduced more rigorous requirements around authentication, web-facing application security, and targeted risk analysis.
DotSec has more than 15 years of experience securing payment environments for government, APRA-regulated entities, financial institutions, utilities and national retail organisations. We focus on what PCI DSS was designed to achieve: practical, risk-driven improvements that reduce the likelihood and impact of compromise, not superficial checkbox activity.
PCI DSS (the Payment Card Industry Data Security Standard) is a set of technical and operational requirements designed to protect cardholder data. Compliance means implementing, operating and maintaining a comprehensive set of controls relating to:
Network segmentation and security
Access control and authentication
Logging, monitoring and incident response
Secure software development
Vulnerability management
Physical security and hosted environments
Supplier and service-provider oversight
PCI DSS compliance applies to any organisation that touches payment card data, even indirectly. That includes retailers, e-commerce sites, service providers, franchise networks, billing platforms, hospitality groups and SaaS platforms that integrate payment processing.
Your business will almost certainly need to be PCI DSS compliant if you:
Accept credit or debit cards (online or in-store)
Use a payment gateway or merchant provider
Store or transmit cardholder data (even temporarily)
Develop or host systems involved in payment processing
Are a managed service provider to organisations who themselves process cardholder data
PCI DSS compliance is not optional in Australia. It is expected by banks, acquirers, insurers, and partners, and is frequently required as part of due-diligence processes.
The compliance burden varies significantly depending on how your organisation handles card data. For example, merchants using fully hosted payment pages may qualify for a minimal SAQ A self-assessment, while those with broader card data environments face more extensive requirements.
In either case, non-compliance leaves your organisation exposed to card scheme fines, increased transaction fees, and potential loss of the ability to process card payments
Generally speaking, all merchants have reporting requirements, irrespective of their level. However, the specific requirements differ: Most merchants, except for the highest level (Level 1), are typically required to complete a Self-Assessment Questionnaire (SAQ). Level 1 merchants, on the other hand, usually need to undergo an annual assessment by a Qualified Security Assessor (QSA).
For the bulk of merchants, the key to PCI DSS compliance is the Self-Assessment Questionnaire (SAQ).
Different SAQs exist, each tailored to different types of payment processing environments. The specific SAQ a merchant needs to complete depends on how they process card payments.
SAQ A (Self-Assessment Questionnaire A) is the leanest of the PCI DSS reporting paths, meaning that it can be used (in general) with very little effort or time.
Merchants prefer SAQ A because there are only 26 controls (and some of those might be non-applicable) and it’s often possible for the merchant to offload many of its PCI DSS responsibilities to third-party providers such as payment gateways or security service providers, as long as those third parties are themselves PCI DSS compliant.
To be eligible for SAQ A, all cardholder data functions must be fully outsourced to PCI DSS-compliant TSPs, and merchants must:
Tier 1 merchants and service providers, or those merchants/service-providers who have particular acquirer requirements, will need to report using a Report On Compliance (ROC).
In this scenario, DotSec’s Qualified Security Assessor (QSA) will formally assess how effectively the client meets the applicable requirements from the PCI DSS.
In contrast to the collaborative nature of a scoping or gap-analysis project, the QSA-led PCI DSS assessment will be a formal assessment process, the outcomes of which are documented in a formal Report on Compliance (ROC):
It is important to note that the formal QSA-led assessment must be conducted in a timely manner. As a QSA Company, dotSec would ensure that the client remains aware of the assessment timetable, impending deadlines and project completion date.
dotSec stands out among other PCI DSS companies in Australia for a couple of important reasons:
Answer: PCI DSS v4.0.1 is the current and only active version of the standard. PCI DSS v3.2.1 was retired on 31 March 2024, and the interim v4.0 was retired on 31 December 2024, leaving v4.0.1 as the sole active version from January 2025. A further milestone came on 31 March 2025, when the 51 future-dated requirements within v4.0.1 became fully mandatory, including expanded requirements for web-facing application security (script management), stronger multi-factor authentication, and targeted risk analysis. If your organisation last completed a PCI DSS assessment under v3.2.1, a gap analysis against v4.0.1 is worth undertaking.
Reference: PCI security blog
Answer: SAQ selection depends primarily on how your organisation processes card payments whether you use a hosted payment page, a direct integration, card-present terminals, or a combination. Selecting the wrong SAQ is a common and consequential error; it can create a false sense of compliance or impose unnecessary controls. dotSec can determine the appropriate SAQ for your environment as part of a scoping engagement.
Reference: What’s new blog post
Answer: It depends on which reporting path applies. A gap analysis engagement, covering SAQ determination, gap analysis, and SAQ completion and reporting, typically requires around one week of work. A QSA-led assessment leading to a Report on Compliance is not something we can estimate without a scoping conversation. The time required depends on how mature your organisation’s current controls are, whether you have completed a previous AOC and ROC, and the nature and extent of any compliance gaps. Contact dotSec to arrange a scoping discussion before committing to a timeline.
Answer: Scope defines which systems, people, and processes are subject to PCI DSS requirements. The broader the scope, the more controls must be implemented and evidenced. Scope reduction can be done using network segmentation, tokenisation, or outsourcing cardholder data functions to compliant third parties; which ever technique you choose, scope reduction is one of the most cost-effective ways to simplify compliance. dotSec’s scoping work routinely identifies opportunities to reduce scope before an assessment begins.
Reference: Segmentation and scoping guidance
If you need to report under the PCI DSS, whether through a SAQ or a QSA-led assessment, dotSec can help you find the most direct, cost-effective path to compliance.
We take scope reduction seriously. Where there is a legitimate opportunity to narrow the compliance boundary through segmentation, tokenisation, or the use of compliant third-party services, we will identify it. A well-scoped engagement costs less, takes less time, and produces a more defensible result. That is good for you, and it is the basis of the kind of long-term working relationship we aim to build.
Contact us to discuss your PCI DSS requirements.
Practical and experienced Australian ISO 27001 and ISMS consulting services. We will help you to establish, implement and maintain an effective information security management system (ISMS).
DotSec’s penetration tests are conducted by experienced, Australian testers who understand real-world attacks and secure-system development. Clear, actionable recommendations, every time.
dotSec stands out among other PCI DSS companies in Australia: We are not only a PCI QSA company, we are a PCI DSS-compliant service provider so we have first-hand compliance experience.
Web Application Firewalls (WAFs) are critical for protecting web applications and services, by inspecting and filtering out malicious requests before they reach your web servers
Multi-Factor Authentication (MFA) and Single Sign-On (SSO) reduce password risks, simplify access, letting verified and authorised users reach sensitive systems, services and apps.
dotSec provides comprehensive vulnerability management services. As part of this service, we analyse findings in the context of your specific environment, priorities and threat landscape.
We don’t just test whether users will click a suspicious link — we also run exercises, simulating phishing attacks that are capable of bypassing multi-factor authentication (MFA) protections.
DotSec’s penetration testing services help you identify and reduce technical security risks across your applications, cloud services and internal networks. Clear, actionable recommendations, every time!
dotSec has provided Australian managed SOC, SIEM and EDR services for 15 years. PCI DSS-compliant and ISO 27001-certified. Advanced log analytics, threat detection and expert investigation services.
We provide prioritised, practical guidance on how to implement secure configurations properly. Choose from automated deployment via Intune for Windows, Ansible for Linux or Cloud Formation for AWS.
Secure web hosting is fundamental to protecting online assets and customer data. We have over a decade of AWS experience providing highly secure, scalable, and reliable cloud infrastructure.
DotSec helps organisations to benefit from the ACSC Essential Eight by assessing maturity levels, applying practical security controls, assessing compliance, and improving resilience against attacks.
Evaluation against the CIS 18 Controls establishes a clear baseline for stakeholders, supporting evidence-based planning, budgeting, maturity-improvement and compliance decisions
We have over 25 years of cyber security experience, providing practical risk-based guidance, advisory and CISO services to a wide range of public and private organisations across Australia.