All termsComplianceAdvancedUpdated April 10, 2026

What Is PCI SSC?

The Payment Card Industry Security Standards Council (PCI SSC) is a global body founded by Visa, Mastercard, American Express, Discover, and JCB to develop and maintain security standards that protect cardholder data across the payment ecosystem.

Also known as: Payment Card Industry Security Standards Council, PCI Council, The Council, PCI Security Standards Council

Key Takeaways

  • The PCI SSC writes and maintains payment security standards — it does not enforce them. Enforcement sits with card brands and acquirers.
  • The Council's portfolio covers more than PCI DSS, including P2PE, 3DS, PIN Security, and the Software Security Framework.
  • PCI DSS 4.0 introduced 64 new requirements, with the most complex taking effect in March 2025 — merchants must audit their gaps now.
  • QSAs and ASVs are certified by the PCI SSC, making Council accreditation the authoritative signal of assessor credibility.
  • Participation in the Council as a Participating Organization gives merchants and vendors direct input into standards before they become mandatory.

The PCI Security Standards Council (PCI SSC) is the organization behind virtually every security rule that governs how card payments are handled, stored, and transmitted worldwide. Understanding the Council — what it does, what it doesn't do, and how it structures its standards — is essential for any merchant, developer, or payment professional who touches cardholder data.

How PCI SSC Works

The Council operates through a structured governance and publication process that moves from industry input to enforceable standards. Each step is deliberate, with public comment periods built in to capture real-world feedback from the merchants and vendors who must live with the rules.

01

Council Formation and Governance

The PCI SSC was founded in 2006 by five payment brands — Visa, Mastercard, American Express, Discover, and JCB. These founding members hold ultimate authority over the Council's direction. Day-to-day governance is carried out by a Board of Advisors and working groups composed of Participating Organizations drawn from merchants, processors, banks, and technology vendors.

02

Standards Development

The Council drafts new standards and major revisions through a multi-stage process. Subject matter experts and working groups produce draft documents. These are released for public Request for Comment (RFC) periods, often lasting 60–90 days, before the Council incorporates feedback and publishes a final version.

03

Assessor Certification

The PCI SSC trains and certifies the professionals who validate compliance. Qualified Security Assessors (QSAs) conduct formal audits for large organizations. Approved Scanning Vendors (ASVs) run external vulnerability scans. Internal Security Assessors (ISAs) are trained to perform assessments within their own organizations. All must pass Council examinations and adhere to a code of professional responsibility.

04

Standard Publication and Lifecycle Management

Once published, each standard enters an active lifecycle. The Council issues supplemental guidance, FAQs, and information supplements throughout the standard's life. Major versions are typically published every three to four years, with sunset dates set for prior versions to give organizations structured migration timelines.

05

Enforcement Handoff

The PCI SSC does not fine or penalize non-compliant organizations. Once a standard is published, enforcement authority passes entirely to the individual payment brands and to acquiring banks. They set compliance deadlines, conduct spot audits, and apply contractual penalties — up to and including terminating a merchant's ability to accept card payments.

Why PCI SSC Matters

Before the Council existed, each major card brand ran its own security program with its own requirements. A merchant accepting Visa, Mastercard, and Amex faced three separate audits, three sets of rules, and three sets of fines. The PCI SSC replaced that fragmentation with a single unified framework, dramatically reducing compliance overhead for the global payments industry.

The scale of the problem the Council was created to address has not shrunk. According to the Verizon 2023 Payment Security Report, only 36% of organizations fully maintained PCI compliance at interim assessment — meaning nearly two-thirds had slipped out of compliance between formal audits. The IBM Cost of a Data Breach Report 2023 put the global average cost of a data breach at $4.45 million, with payment-sector breaches among the most expensive categories. Meanwhile, PCI DSS 4.0, finalized in March 2022, introduced 64 new requirements — 13 of which became mandatory in March 2024 and 51 more in March 2025 — making the Council's output more consequential to merchant operations than at any point since 2006.

PCI DSS 4.0 Deadline

All 64 new PCI DSS 4.0 requirements became fully mandatory by March 31, 2025. Organizations that were still assessing under PCI DSS 3.2.1 after that date were considered non-compliant by default. If you haven't completed a 4.0 gap analysis, start immediately.

PCI SSC vs. PCI DSS

Many practitioners use "PCI SSC" and "PCI DSS" interchangeably. They are not the same thing. Understanding the distinction prevents compliance strategy errors.

DimensionPCI SSCPCI DSS
What it isThe governing body (the Council)A specific standard published by the Council
ScopeAll payment security standardsCardholder data environments specifically
Enforcement roleNone — publishes and maintains standardsEnforced by card brands and acquirers
OutputDSS, P2PE, 3DS, PIN Security, SSF, and more12 requirement domains covering network, access, monitoring, and testing
AudienceIndustry-wide (merchants, vendors, assessors)Any entity that stores, processes, or transmits cardholder data
UpdatesGoverned by Council lifecycle policyv4.0 released March 2022; all requirements active March 2025

The PCI SSC is the institution. PCI DSS is one of its most important publications — but far from its only one.

Types of PCI SSC Standards

The Council maintains a portfolio of distinct standards, each targeting a specific layer of the payment ecosystem. Merchants and developers often encounter more than one of these simultaneously.

PCI DSS — The foundational standard covering all environments that store, process, or transmit cardholder data. Twelve requirement domains address network security, access control, monitoring, and regular testing.

Software Security Framework (SSF) — Replaces the older PA-DSS standard. Covers payment software security through the Secure Software Standard and the Secure Software Lifecycle Standard. Relevant to any vendor building payment applications.

PCI P2PE — Governs Point-to-Point Encryption solutions that encrypt cardholder data from the point of interaction to a validated decryption environment. Merchants using a PCI-validated P2PE solution can dramatically reduce their DSS assessment scope.

PCI 3DS — Sets security requirements for 3-D Secure environments, including issuers, acquirers, and 3DS server operators. Relevant to any organization implementing strong customer authentication.

PIN Security Standard — Covers the management, processing, and transmission of PIN data at ATMs and POS terminals. Primarily relevant to acquirers and terminal manufacturers.

PCI TSP (Token Service Provider) — Defines requirements for organizations that issue network tokens, such as those used in digital wallets and card-on-file transactions.

Best Practices

For Merchants

Keep your compliance posture active between formal assessments. The Verizon data cited above shows most organizations degrade between audits — which is precisely when breaches occur. Assign an internal owner for each PCI SSC requirement domain, not just a single compliance manager. When selecting a P2PE or tokenization vendor, verify they appear on the PCI SSC's online list of validated solutions — never rely solely on a vendor's self-attestation. Review the PCI SSC's supplemental guidance documents when entering a new payment channel (e-commerce, mobile, unattended retail), as each channel has specific scoping implications.

For Developers

Align your software development lifecycle to the PCI SSC's Software Security Framework before you begin building payment features — retrofitting security controls is always more expensive than designing them in from the start. Use only cryptographic algorithms and key lengths approved in the PCI SSC's Cryptographic Algorithm Validation documentation. If your application touches cardholder data, track the Council's published testing procedures alongside the requirements themselves — assessors use these procedures directly, and developers who understand them write more auditable code.

Common Mistakes

Confusing the Council with the enforcer. Merchants sometimes direct compliance disputes or waiver requests to the PCI SSC. The Council has no enforcement authority. Disputes must go to your acquiring bank or the relevant card brand.

Treating PCI DSS as the whole picture. Organizations that implement P2PE, 3DS, or network tokenization need to understand the separate Council standards governing those technologies — DSS compliance alone does not cover them.

Relying on outdated QSA lists. QSA company certifications can lapse. Always verify your assessor's current status on the PCI SSC's official validated-companies registry before engaging them for a formal assessment.

Ignoring information supplements. The Council regularly publishes supplemental guidance on topics like cloud computing, virtualization, and e-commerce. These documents are not optional reading — they clarify how core DSS requirements apply to modern architectures and are used by QSAs during assessments.

Assuming validation equals compliance. A passing Report on Compliance (ROC) or completed SAQ represents a point-in-time snapshot. Controls can erode the day after an assessment. Continuous monitoring and quarterly internal reviews are necessary to maintain the posture the Council's standards require.

PCI SSC and Tagada

Tagada is a payment orchestration platform, which means it sits within the cardholder data flow between merchants and their downstream processors. This places Tagada's infrastructure squarely within scope for PCI SSC standards — and it directly reduces scope for the merchants who use it.

When you route payments through Tagada, your integration is designed so that raw PANs never touch your own servers. Tagada's tokenization layer and validated encryption controls mean your PCI DSS assessment scope is narrowed to the integration points rather than a full cardholder data environment. Ask your QSA to review Tagada's service provider attestation before scoping your assessment — this alone can eliminate entire DSS requirement domains from your audit.

Frequently Asked Questions

Who founded the PCI SSC and when?

The PCI SSC was founded in 2006 by five major payment brands: Visa, Mastercard, American Express, Discover, and JCB. These founding members created the Council to consolidate what had been five separate, often conflicting security programs into a single unified framework. The Council is headquartered in Wakefield, Massachusetts, and operates as a global organization with participating organizations across more than 100 countries.

Does PCI SSC enforce compliance directly?

No. The PCI SSC writes and maintains the standards, but it does not enforce them. Enforcement is the responsibility of the individual payment brands (Visa, Mastercard, etc.) and acquiring banks. They set deadlines, apply fines, and can ultimately revoke a merchant's ability to accept card payments. This distinction is important — the Council is a standards body, not a regulator or law enforcement entity.

What standards does the PCI SSC publish beyond PCI DSS?

The PCI SSC publishes a broad portfolio of standards beyond PCI DSS. These include PA-DSS (Payment Application Data Security Standard, now succeeded by the Software Security Framework), PCI P2PE (Point-to-Point Encryption), PCI TSP (Token Service Provider), PCI 3DS (3-D Secure), and the PIN Security Standard. Each addresses a specific component of the payment ecosystem, from hardware terminals to software applications to authentication protocols.

What is a Qualified Security Assessor (QSA) and how does the PCI SSC relate to them?

A Qualified Security Assessor is a company certified by the PCI SSC to conduct on-site PCI DSS assessments for organizations that require a formal audit. The Council trains, tests, and maintains a global registry of QSA companies. Merchants and service providers above certain transaction thresholds must use a QSA to validate compliance rather than completing a self-assessment questionnaire. The PCI SSC also certifies Internal Security Assessors (ISAs) who operate within a single organization.

How often does PCI SSC update its standards?

The PCI SSC follows a structured lifecycle for each standard. PCI DSS version 4.0, released in March 2022, gave organizations until March 2025 to fully comply with all new requirements, with the prior version 3.2.1 retiring at that date. The Council typically publishes major versions every three to four years, with supplemental guidance documents and clarifications released in between. Stakeholders can participate in Request for Comment (RFC) periods before each version is finalized.

What is a Participating Organization and why should merchants consider joining?

Participating Organizations are companies that pay an annual fee to join the PCI SSC community. Members gain early access to draft standards during RFC periods, the ability to vote on Council decisions, invitations to community meetings, and direct input into how standards evolve. For large merchants, payment processors, and technology vendors, membership provides a competitive advantage by letting teams shape the rules they will eventually be required to follow.

Tagada Platform

PCI SSC — built into Tagada

See how Tagada handles pci ssc as part of its unified commerce infrastructure. One platform for payments, checkout, and growth.