PCI DSS compliance for Australian organisations

Payment card information remains one of the most targeted forms of data. For Australian organisations that store, process or transmit cardholder data, PCI DSS compliance is a practical risk management requirement as much as a contractual one. The current standard, PCI DSS v4.0.1, came into full effect in 2024 and introduced more rigorous requirements around authentication, web-facing application security, and targeted risk analysis.

DotSec has more than 15 years of experience securing payment environments for government, APRA-regulated entities, financial institutions, utilities and national retail organisations. We focus on what PCI DSS was designed to achieve: practical, risk-driven improvements that reduce the likelihood and impact of compromise, not superficial checkbox activity.

What is PCI DSS compliance?

PCI DSS (the Payment Card Industry Data Security Standard) is a set of technical and operational requirements designed to protect cardholder data. Compliance means implementing, operating and maintaining a comprehensive set of controls relating to: 

  • Network segmentation and security

  • Access control and authentication

  • Logging, monitoring and incident response

  • Secure software development

  • Vulnerability management

  • Physical security and hosted environments

  • Supplier and service-provider oversight

PCI DSS compliance applies to any organisation that touches payment card data, even indirectly. That includes retailers, e-commerce sites, service providers, franchise networks, billing platforms, hospitality groups and SaaS platforms that integrate payment processing.

Do I need PCI DSS compliance?

Your business will almost certainly need to be PCI DSS compliant if you: 

  • Accept credit or debit cards (online or in-store)

  • Use a payment gateway or merchant provider

  • Store or transmit cardholder data (even temporarily)

  • Develop or host systems involved in payment processing

  • Are a managed service provider to organisations who themselves process cardholder data

PCI DSS compliance is not optional in Australia. It is expected by banks, acquirers, insurers, and partners, and is frequently required as part of due-diligence processes. 

The compliance burden varies significantly depending on how your organisation handles card data. For example, merchants using fully hosted payment pages may qualify for a minimal SAQ A self-assessment, while those with broader card data environments face more extensive requirements. 

In either case, non-compliance leaves your organisation exposed to card scheme fines, increased transaction fees, and potential loss of the ability to process card payments

PCI DSS reporting options

Generally speaking, all merchants have reporting requirements, irrespective of their level. However, the specific requirements differ: Most merchants, except for the highest level (Level 1), are typically required to complete a Self-Assessment Questionnaire (SAQ). Level 1 merchants, on the other hand, usually need to undergo an annual assessment by a Qualified Security Assessor (QSA).

Option 1: SAQ and AOC

For the bulk of merchants, the key to PCI DSS compliance is the Self-Assessment Questionnaire (SAQ). 

Different SAQs exist, each tailored to different types of payment processing environments. The specific SAQ a merchant needs to complete depends on how they process card payments.

SAQ A (Self-Assessment Questionnaire A) is the leanest of the PCI DSS reporting paths, meaning that it can be used (in general) with very little effort or time.

Merchants prefer SAQ A because there are only 26 controls (and some of those might be non-applicable) and it’s often possible for the merchant to offload many of its PCI DSS responsibilities to third-party providers such as payment gateways or security service providers, as long as those third parties are themselves PCI DSS compliant.

To be eligible for SAQ A, all cardholder data functions must be fully outsourced to PCI DSS-compliant TSPs, and merchants must:

  • Not store, process, or transmit cardholder data on their systems.
  • Use only redirects, iframes, or hosted payment pages.
  • Confirm their ecommerce site is not susceptible to script-based attacks

Option 2: AOC and ROC

Tier 1 merchants and service providers, or those merchants/service-providers who have particular acquirer requirements, will need to report using a Report On Compliance (ROC). 

In this scenario, DotSec’s Qualified Security Assessor (QSA) will formally assess how effectively the client meets the applicable requirements from the PCI DSS.

In contrast to the collaborative nature of a scoping or gap-analysis project, the QSA-led PCI DSS assessment will be a formal assessment process, the outcomes of which are documented in a formal Report on Compliance (ROC):

  • If DotSec’s QSA finds that the reporting entity is compliant with the requirements of the PCI DSS, then we’ll complete and deliver a RoC and an Attestation of Compliance (AoC).
  • If DotSec’s QSA finds that the entity does not comply with the requirements of the PCI DSS, then those findings will be documented in the RoC which will be delivered to the client, and a non-compliant AoC will be issued.

It is important to note that the formal QSA-led assessment must be conducted in a timely manner. As a QSA Company, dotSec would ensure that the client remains aware of the assessment timetable, impending deadlines and project completion date.

Why choose dotSec for PCI DSS compliance in Australia

dotSec stands out among other PCI DSS companies in Australia for a couple of important reasons:

  • Compliance by experience: We are a PCI DSS-compliant service provider with an AOC to prove it. We have first-hand experience implementing and maintaining a compliant PCI DSS environment, not just assessing others against it. We know what it takes to implement and maintain a compliant PCI DSS service.  
  • Qualified team: Our PCI DSS professionals hold a  a wide range of certifications including QSA, ISO 27001, CISA, CISM and more.  We’re not just a one-shot, tick-the-box QSA assessor company. 
  • Independent and practical: Our recommendations are grounded in real implementation experience. We have remediated situations where clients received incorrect SAQ selection, mistaken controls, and impractical compliance guidance from less experienced providers.
  • Scope reduction focus: If we can reduce your compliance scope or simplify your reporting path, we will. Clients with well-scoped, right-sized compliance programs are better positioned for the long term — and tend to form longer relationships with the firms that help them get there. You can rely on us to provide experience-led and pragmatic advice.

PCI DSS compliance FAQ

Which version of PCI DSS applies now?

Answer: PCI DSS v4.0.1 is the current and only active version of the standard. PCI DSS v3.2.1 was retired on 31 March 2024, and the interim v4.0 was retired on 31 December 2024, leaving v4.0.1 as the sole active version from January 2025. A further milestone came on 31 March 2025, when the 51 future-dated requirements within v4.0.1 became fully mandatory, including expanded requirements for web-facing application security (script management), stronger multi-factor authentication, and targeted risk analysis. If your organisation last completed a PCI DSS assessment under v3.2.1, a gap analysis against v4.0.1 is worth undertaking.

Reference: PCI security blog

Answer: SAQ selection depends primarily on how your organisation processes card payments whether you use a hosted payment page, a direct integration, card-present terminals, or a combination. Selecting the wrong SAQ is a common and consequential error; it can create a false sense of compliance or impose unnecessary controls. dotSec can determine the appropriate SAQ for your environment as part of a scoping engagement.

Reference: What’s new blog post

Answer: It depends on which reporting path applies. A gap analysis engagement, covering SAQ determination, gap analysis, and SAQ completion and reporting, typically requires around one week of work. A QSA-led assessment leading to a Report on Compliance is not something we can estimate without a scoping conversation. The time required depends on how mature your organisation’s current controls are, whether you have completed a previous AOC and ROC, and the nature and extent of any compliance gaps. Contact dotSec to arrange a scoping discussion before committing to a timeline.

 

Answer:  Scope defines which systems, people, and processes are subject to PCI DSS requirements. The broader the scope, the more controls must be implemented and evidenced. Scope reduction can be done using network segmentation, tokenisation, or outsourcing cardholder data functions to compliant third parties; which ever technique you choose, scope reduction is one of the most cost-effective ways to simplify compliance. dotSec’s scoping work routinely identifies opportunities to reduce scope before an assessment begins.

Reference: Segmentation and scoping guidance

What next?

If you need to report under the PCI DSS, whether through a SAQ or a QSA-led assessment, dotSec can help you find the most direct, cost-effective path to compliance.

We take scope reduction seriously. Where there is a legitimate opportunity to narrow the compliance boundary through segmentation, tokenisation, or the use of compliant third-party services, we will identify it. A well-scoped engagement costs less, takes less time, and produces a more defensible result. That is good for you, and it is the basis of the kind of long-term working relationship we aim to build.

Contact us to discuss your PCI DSS requirements.

Premier australian cyber security specialists