PCI DSS v4.0 · Payment Card Industry Assessment

Benchmark Your PCI DSS Compliance Posture

25 targeted questions across 5 PCI DSS domains. Instant scoring, domain-level gap analysis, and actionable recommendations — free, no login required.

⏱ ~8 minutes 📋 5 domains · 25 questions 📊 Instant readiness report ✓ Free · No login required
Req. 1 Req. 3 Req. 7 Req. 8 Req. 10 Req. 11 Req. 12
Domain 1 of 5 0% complete
1
2
3
4
5
Network
Data
Access
Monitor
Policy
🌐
Req. 1–2
Network Security Controls
PCI DSS v4.0 Requirements 1–2 mandate network security controls that separate the cardholder data environment (CDE) from untrusted networks, and the elimination of vendor-supplied default credentials before system deployment.
Q1 · Domain 1
Network firewall/segmentation controls separate the cardholder data environment (CDE) from all other networks?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q2 · Domain 1
All vendor-supplied default passwords and security settings changed before system deployment?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q3 · Domain 1
Accurate network diagram maintained showing all connections to and from the CDE?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q4 · Domain 1
Outbound traffic from CDE restricted to only business-justified communications?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q5 · Domain 1
Wireless networks assessed and unauthorised wireless access points identified and blocked?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
🔐
Req. 3–4
Cardholder Data Protection
PCI DSS Requirements 3–4 require organisations to protect stored cardholder data (CHD) through strong cryptography and to ensure that Primary Account Numbers (PANs) are rendered unreadable. All CHD transmission over open public networks must use strong encryption.
Q1 · Domain 2
Cardholder data discovery process identifies all locations where CHD is stored across the environment?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q2 · Domain 2
Primary Account Numbers (PANs) encrypted at rest using strong cryptography (AES-256)?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q3 · Domain 2
PANs masked when displayed and sensitive authentication data not stored post-authorisation?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q4 · Domain 2
Strong cryptography (TLS 1.2 or higher) used for all CHD transmission over open public networks?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q5 · Domain 2
Cryptographic key management procedures cover generation, distribution, storage, and rotation?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
🔑
Req. 7–9
Access Control
PCI DSS Requirements 7–9 restrict access to system components and cardholder data to only those individuals whose job requires it, ensure unique user identification, and protect physical access to CDE components.
Q1 · Domain 3
Access to CDE restricted on a strict need-to-know and least privilege basis?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q2 · Domain 3
Unique user IDs assigned to all users — no shared or group accounts permitted for CDE access?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q3 · Domain 3
Multi-factor authentication required for all non-console access to the CDE?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q4 · Domain 3
Physical access to CDE hardware (servers, POS terminals, network equipment) controlled and logged?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q5 · Domain 3
All remote access to the CDE secured with MFA and sessions fully logged?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
📊
Req. 10–11
Monitoring & Testing
PCI DSS Requirements 10–11 require logging of all access to network resources and cardholder data, daily log review, quarterly internal vulnerability scanning, and annual external penetration testing by a qualified assessor.
Q1 · Domain 4
All access to network resources and cardholder data logged with timestamps and user identity?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q2 · Domain 4
Log monitoring alerts reviewed daily, or automated SIEM deployed with real-time alerting?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q3 · Domain 4
Internal vulnerability scans conducted at least quarterly and after significant changes?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q4 · Domain 4
External penetration testing conducted at least annually by a qualified internal or external assessor?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q5 · Domain 4
File integrity monitoring (FIM) deployed on critical CDE files and system components?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
📋
Req. 12
Security Policy & Compliance Management
PCI DSS Requirement 12 mandates a comprehensive information security policy, annual security awareness training, an incident response plan covering payment card breach scenarios, and validation of third-party service provider PCI DSS compliance.
Q1 · Domain 5
Information security policy reviewed at least annually and communicated to all personnel?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q2 · Domain 5
Security awareness training covering payment card security delivered to all staff upon hire and annually?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q3 · Domain 5
Incident response plan covers payment card data breach scenarios with defined roles and timelines?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q4 · Domain 5
Annual PCI DSS self-assessment questionnaire (SAQ) or QSA audit completed and reviewed with management?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q5 · Domain 5
All third-party service providers handling CHD validated as PCI DSS compliant annually?
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Please answer all questions to continue.
🔗
You're viewing a shared assessment report
Take your own assessment to get personalised results.
0%
0 / 75 pts
PCI DSS READINESS SCORE
🔴 Critical Risk

Critical PCI DSS non-compliance detected. Immediate remediation required.

Domain Breakdown
Priority Recommendations
PCI DSS Toolkit → Start Free Tabletop Exercises →

More Free Assessments

🇪🇺 NIS2 Readiness 🏦 DORA Readiness 🔐 CMMC 2.0 Readiness 🏥 HIPAA Security

This assessment is self-reported and indicative only. It does not constitute formal legal or compliance advice. Consult a Qualified Security Assessor (QSA) for definitive PCI DSS obligations.