{"id":8936,"date":"2024-03-14T09:36:51","date_gmt":"2024-03-14T08:36:51","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/dot\/?p=8936"},"modified":"2025-11-20T15:28:36","modified_gmt":"2025-11-20T14:28:36","slug":"pci-dss-standard","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/","title":{"rendered":"PCI-DSS standard"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:20px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"846\" height=\"315\" alt=\"Banner Article Norme PCI-DSS\" title=\"banner-article-pci-dss-norme\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp\" class=\"lazyload img-responsive wp-image-8926\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27846%27%20height%3D%27315%27%20viewBox%3D%270%200%20846%20315%27%3E%3Crect%20width%3D%27846%27%20height%3D%27315%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme-200x74.webp 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme-400x149.webp 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme-600x223.webp 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme-800x298.webp 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp 846w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>PCI-DSS defines security standards to protect credit card transactions. Managed by the PCI Security Standards Council, it prevents data leakage and online fraud. In the next sections, you'll learn about its importance, target audience and key requirements, along with the benefits of software solutions such as <b><a href=\"\/dot\/data-masking\/dot-anonymizer\/\" target=\"_blank\" rel=\"noopener noreferrer\">DOT Anonymizer<\/a><\/b> for compliance.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-bottom:25px;--awb-padding-left:25px;--awb-bg-color:rgba(0,100,254,0.09);--awb-bg-color-hover:rgba(0,100,254,0.09);--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:left;--awb-font-size:18px;\"><p style=\"text-align: center;\"><b>Summary<\/b><\/p>\n<ol>\n<li><a href=\"#what-is-pci-dss\">What is PCI-DSS?<\/a><\/li>\n<li><a href=\"#which-companies-need-to-comply-and-when\">Which companies need to comply, and when? <\/a><\/li>\n<li><a href=\"#what-are-the-different-pci-dss-compliance-requirements\">What are the different PCI DSS compliance requirements?<\/a><\/li>\n<li><a href=\"#why-is-pci-dss-important\">Why is PCI DSS important?<\/a><\/li>\n<li><a href=\"#what-are-the-advantages-of-using-a-software-solution-like-dot-anonymizer-to-comply-with-this-standard\">What are the advantages of using a software solution like DOT Anonymizer to comply with this standard?<\/a><\/li>\n<li><a href=\"#conclusion\">Conclusion<\/a><\/li>\n<\/ol>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-menu-anchor\" id=\"what-is-pci-dss\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">1. What is PCI-DSS?<\/h2><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-content-alignment:left;\"><p>Payment Card Industry (PCI) compliance involves<b> adhering to security standards to ensure the safety of credit card transactions, in line with the requirements imposed by credit card companies.<\/b> PCI standards are managed by the <b>PCI Security Standards Council, comprising companies such as Visa, MasterCard, American Express, Discover and JCB<\/b>. The PCI DSS standard, which stands for <b>Payment Card Industry Data Security Standard, aims both to eliminate the risk of payment data leakage and to reduce online fraud<\/b> by imposing requirements for payment data security. <\/p>\n<p>These standards were created to protect end-users, intermediaries, banks, and merchants against bank data fraud through the establishment of strict rules to ensure the secure processing, storage, and transmission of credit card data.<\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"which-companies-need-to-comply-and-when\"><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">2. Which companies need to comply, and when?<\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:left;\"><p>The level of PCI DSS compliance varies<b> according to the company's annual transaction volume, whether it's a small family-run business or a large multinational. <\/b>Whatever their size, companies must comply with the PCI DSS standard if they accept, send, process or store credit card or cardholder data. <b>By adopting the PCI DSS standard, companies demonstrate their commitment to protecting their customers' data<\/b>, as the consequences of a security breach can have a serious impact on revenues, customers, and the company's reputation. <\/p>\n<p><b>Version 4.0 of the PCI DSS standard was first released in 2022<\/b> to address emerging cyber-attack threats, and companies have <b>until March 31, 2025<\/b>, to be compliant. <\/p>\n<p>Although PCI DSS compliance is not federally mandated in the US, companies must comply with applicable laws and regulations in their jurisdiction, and non-compliance can result in significant fines.<\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"what-are-the-different-pci-dss-compliance-requirements\"><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">3. What are the different PCI DSS compliance requirements?<\/h2><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-content-alignment:left;\"><p>There are the 12 requirements of the PCI DSS standard that have been established in the latest version 4.0: <\/p>\n<ol>\n<li>Install and manage a firewall configuration to protect cardholder data.<\/li>\n<li>Do not use the default values provided for system passwords and other security settings.<\/li>\n<li><b>Protect stored cardholder data.<\/b><\/li>\n<li>Encrypt transmission of cardholder data over public and open networks<\/li>\n<li>Use and regularly update anti-virus software or programs.<\/li>\n<li>Develop and maintain secure systems and applications.<\/li>\n<li><b>Restrict access to cardholder data according to business needs<\/b>.<\/li>\n<li>Assign a unique identifier to each person with access to a computer.<\/li>\n<li>Limit physical access to cardholder data.<\/li>\n<li>Track and monitor all access to network resources and cardholder data.<\/li>\n<li><b>Regularly test security systems and processes.<\/b><\/li>\n<li><b>Maintain an information security policy for all staff.<\/b><\/li>\n<\/ol>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:rgb(234, 80, 80);--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><p><b>Guide \u2013 Data Anonymization Keys to a Successful Cross-functional Project<\/b><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#356897;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"\/dot\/resources\/guides-resources\/data-anonymization-keys-to-successful-cross-functional-project\/?\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download the guide<\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-menu-anchor\" id=\"why-is-pci-dss-important\"><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">4. Why is PCI DSS important?<\/h2><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-content-alignment:left;\"><p>The exponential growth in the amount of banking data processed every day reflects the global population growth, with over 90% of this data generated in recent years. According to the PCI SSC (PCI Security Standards Council), <b>the average cost of a data breach is $3.8 million. <\/b>This number alone justifies the imperative to take steps to avoid such incidents. <\/p>\n<p>It's also worth noting that <b>some jurisdictions consider cardholder data to be personal data, making it subject to the <a href=\"\/dot\/anonymization-and-gdpr-key-challenges-obligations-and-best-practices\/\">GDPR (General Data Protection Regulation)<\/a><\/b> and adding a legal dimension to its protection.<\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"what-are-the-advantages-of-using-a-software-solution-like-dot-anonymizer-to-comply-with-this-standard\"><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">5. What are the advantages of using a software solution like DOT Anonymizer to comply with this standard?<\/h2><\/div><div class=\"fusion-text fusion-text-8\" style=\"--awb-content-alignment:left;\"><p>Using our software solution, <b><a href=\"\/dot\/data-masking\/dot-anonymizer\/\">DOT Anonymizer<\/a>, <\/b>offers several advantages for PCI-DSS standard compliance. <b>DOT Anonymizer masks or anonymizes personal data such as credit card numbers, reducing the risk of data leakage, stolen data, or unauthorized use<\/b>. It also enhances <b>the security of credit card data during transmission and storage<\/b>, in line with PCI-DSS requirements.<\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"conclusion\"><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">6. Conclusion<\/h2><\/div><div class=\"fusion-text fusion-text-9\" style=\"--awb-content-alignment:left;\"><p>PCI-DSS standard compliance is essential to safeguarding the security of credit card transactions and avoiding costly data breaches. As we approach version 4.0 of the directive and the compliance deadlines, companies are urged to get ready with no further delay. Complying with these standards enables companies to protect the trust of their customers, preserve their reputation and reduce the financial risks associated with data hacking, while ensuring that users' personal and identifying data is protected.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:rgb(234, 80, 80);--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\"><p><strong>DOT Guide: our 5 tips for a successful anonymization project<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#356897;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"\/dot\/resources\/guides-resources\/dot-guide-5-tips-for-a-successful-anonymization-project\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Read our Guide<\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:560px;--awb-max-height:315px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"Iv-vbM6J3FE\" class=\"landscape\" params=\"wmode=transparent&autoplay=1rel=0&amp;enablejsapi=1\" title=\"YouTube video player 1\" data-button-label=\"Play Video\" width=\"560\" height=\"315\" data-thumbnail-size=\"auto\" data-no-cookie=\"on\"><\/lite-youtube><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PCI-DSS defines security standards to protect credit card transactions and prevent data leakage and online fraud.<\/p>\n","protected":false},"author":5,"featured_media":8926,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[113,111],"tags":[],"class_list":["post-8936","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-resources"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PCI-DSS standard | Blog<\/title>\n<meta name=\"description\" content=\"Find out how PCI-DSS defines security standards to protect credit card transactions and prevent data leakage and online fraud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PCI-DSS standard | Blog\" \/>\n<meta property=\"og:description\" content=\"Find out how PCI-DSS defines security standards to protect credit card transactions and prevent data leakage and online fraud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-14T08:36:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-20T14:28:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"846\" \/>\n\t<meta property=\"og:image:height\" content=\"315\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"headline\":\"PCI-DSS standard\",\"datePublished\":\"2024-03-14T08:36:51+00:00\",\"dateModified\":\"2025-11-20T14:28:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/\"},\"wordCount\":3840,\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp\",\"articleSection\":[\"Blog\",\"Resources\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/\",\"name\":\"PCI-DSS standard | Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp\",\"datePublished\":\"2024-03-14T08:36:51+00:00\",\"dateModified\":\"2025-11-20T14:28:36+00:00\",\"author\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"description\":\"Find out how PCI-DSS defines security standards to protect credit card transactions and prevent data leakage and online fraud.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/#primaryimage\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp\",\"contentUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp\",\"width\":846,\"height\":315,\"caption\":\"Banner Article Norme PCI-DSS\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\",\"name\":\"Myriam Goutte\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PCI-DSS standard | Blog","description":"Find out how PCI-DSS defines security standards to protect credit card transactions and prevent data leakage and online fraud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/","og_locale":"en_US","og_type":"article","og_title":"PCI-DSS standard | Blog","og_description":"Find out how PCI-DSS defines security standards to protect credit card transactions and prevent data leakage and online fraud.","og_url":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/","og_site_name":"DOT - Data Oriented Testing","article_published_time":"2024-03-14T08:36:51+00:00","article_modified_time":"2025-11-20T14:28:36+00:00","og_image":[{"width":846,"height":315,"url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp","type":"image\/webp"}],"author":"Myriam Goutte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"headline":"PCI-DSS standard","datePublished":"2024-03-14T08:36:51+00:00","dateModified":"2025-11-20T14:28:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/"},"wordCount":3840,"image":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp","articleSection":["Blog","Resources"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/","url":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/","name":"PCI-DSS standard | Blog","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp","datePublished":"2024-03-14T08:36:51+00:00","dateModified":"2025-11-20T14:28:36+00:00","author":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"description":"Find out how PCI-DSS defines security standards to protect credit card transactions and prevent data leakage and online fraud.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/pci-dss-standard\/#primaryimage","url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp","contentUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/02\/banner-article-pci-dss-norme.webp","width":846,"height":315,"caption":"Banner Article Norme PCI-DSS"},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2","name":"Myriam Goutte"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/8936","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/comments?post=8936"}],"version-history":[{"count":3,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/8936\/revisions"}],"predecessor-version":[{"id":13124,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/8936\/revisions\/13124"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media\/8926"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media?parent=8936"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/categories?post=8936"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/tags?post=8936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}