The Payment Card Industry Data Security Standard (PCI DSS) is a set of security controls based on security best practice, designed and developed by the major card payment schemes (Visa, MasterCard, American Express, JCB, Diners and Discover) to enhance the security of Account Data and thereby reduce the risk of data compromise and fraud on a global basis.
The PCI DSS applies to all organisations that store, process or transmit payment cardholder data. For online businesses, if you can accept a payment card transaction for goods or services on your eCommerce website (even if you hand the transaction off to your payment processor), then the PCI DSS applies to you.
There is a single Payment Card Industry Data Security Standard which details all the controls required to be in place in any Cardholder Data Environment (CDE). The CDE is the part of a business that handles all payment card data.
Depending on the type and number of transactions processed you may be asked to either validate your compliance with the PCI DSS via a Self Assessment Questionnaire or to have an Onsite Assessment by a Qualified Security Assessor (QSA). Merchants (a business that accepts payment card transactions) are categorised into one of four levels. Level 1 merchants being the largest and requiring an onsite assessment, through to level 4 merchants who are required to validate their compliance via a Self Assessment Questionnaire.
In the world of PCI DSS 4.0, "compliance" is no longer a simple one-size-fits-all checkbox. For e-commerce businesses, the difference between a streamlined assessment and a complex, resource-heavy audit often comes down to just two letters: EP.
Understanding this distinction isn't just about passing an audit—it is about understanding where your legal and security responsibilities begin in an era of increasingly sophisticated "digital skimming" attacks.
Both SAQ-A and SAQ-A-EP are designed for merchants who outsource payment processing to a PCI DSS-compliant third party (such as Stripe, PayPal, or Adyen). The critical distinction lies in how that payment form is delivered to your customer's browser.
Think of SAQ-A as a physical wall between you and the payment.
SAQ-A-EP stands for "E-commerce/Partial" outsourcing.
The jump from SAQ-A to SAQ-A-EP is not a minor step; it is an exponential increase in workload.
|
Feature |
SAQ-A |
SAQ-A-EP |
|
Primary Method |
iFrame or URL Redirect |
JavaScript / Direct Post API |
|
Number of Requirements |
~31 |
~195 |
|
Who Hosts the Form? |
The Payment Provider |
Your Website (delivered via script) |
|
Security Scope |
Minimal (Redirect integrity) |
Comprehensive (Server hardening, etc.) |
|
Script Management |
New 4.0 "Informed" checks |
Mandatory (Req 6.4.3 & 11.6.1) |
You might wonder: "If I never store the card data, why does PCI care so much about my website security?". Recent history shows that hackers don't need to touch your server to steal your customers' money. They use a technique called Digital Skimming (or Magecart attacks).
While a crypto-exchange, this $1.5 billion breach exploited third-party storage and malicious JavaScript to manipulate transactions. For an e-commerce merchant, a similar script could be used to "skim" card details from an SAQ-A-EP form before they are ever encrypted.
Attackers are increasingly targeting the third-party plugins you use, such as chat bots, analytics, or marketing pixels. If these scripts are compromised on your payment page, they can capture keystrokes in real-time as users type their sensitive details.
Under the new 4.0 standard, the "A-EP" designation carries significant new weight. Merchants are now required to implement active monitoring for client-side scripts:
Moving from 31 requirements to nearly 200 is a massive operational burden, with significant financial impact. Don't guess your scope; ensure you're on the right path before your compliance deadline.
Our QSA-certified team provides the technical guidance needed to secure your environment while minimizing your compliance overhead.
Learn more about our PCI DSS compliance services for merchants.