PCI DSS SAQ C-VT Compliance Guide
For merchants who manually enter single transactions via a web-based virtual terminal on an isolated, dedicated device.
Covers approximately 79 requirements focused on secure configurations, access control, physical security, and policies. Learn how GRCTrack simplifies your SAQ C-VT compliance.
What Is SAQ C-VT?
SAQ C-VT is a PCI DSS Self-Assessment Questionnaire designed for merchants who process card-not-present transactions by manually entering cardholder data one transaction at a time into a web-based virtual terminal. The virtual terminal is provided and hosted by a PCI DSS validated third-party payment processor, and the merchant accesses it through a standard web browser.
This SAQ type is most commonly used by call centres taking card payments over the phone, mail order businesses processing postal orders, and similar merchants who key card details directly into a payment gateway's virtual terminal interface. The merchant never stores cardholder data electronically, and the virtual terminal device must be isolated from all other systems in the merchant environment.
With approximately 79 requirements, SAQ C-VT sits between the lighter SAQ A (~22 requirements) and the heavier SAQ C (~160 requirements). The reduced scope compared to SAQ C reflects the simpler threat model: the merchant is not running a payment application locally, and the virtual terminal device is isolated and dedicated. However, this reduced scope depends entirely on maintaining strict device isolation and using the virtual terminal only for single, manually-keyed transactions.
Who Qualifies for SAQ C-VT?
Key SAQ C-VT Requirements
Req 2: Secure Configurations
Apply secure configurations to the virtual terminal device and any network components. Change all vendor-supplied defaults, remove unnecessary software and services, and ensure only essential functionality is enabled on the dedicated device.
Req 7: Restrict Access
Restrict access to the virtual terminal device and payment data to only those personnel whose job requires it. Implement role-based access control and ensure only authorized staff can process transactions through the virtual terminal.
Req 8: User Authentication
Assign unique IDs to each person who accesses the virtual terminal. Enforce strong password policies, implement multi-factor authentication for remote access, and ensure shared or group accounts are not used for virtual terminal access.
Req 9: Physical Security
Restrict physical access to the virtual terminal device. Ensure the workstation is in a secure area, implement visitor controls, and protect any paper records containing cardholder data from unauthorized access. Maintain a clean desk policy.
Device Isolation
The virtual terminal device must be isolated and dedicated to payment processing. It must not be used for email, web browsing, file sharing, or other general activities. Network segmentation should prevent other systems from accessing the device.
Req 12: Security Policies
Establish and maintain security policies and procedures covering virtual terminal usage, acceptable use of the dedicated device, incident response procedures, and security awareness training for all personnel who handle cardholder data.
Common SAQ C-VT Mistakes
Using the Virtual Terminal on a Shared Workstation
The most common SAQ C-VT compliance failure is using a general-purpose workstation for virtual terminal access. If the device is also used for email, web browsing, or other business applications, it is not isolated and the merchant does not qualify for SAQ C-VT. The virtual terminal device must be dedicated solely to payment processing, with no other applications or browser tabs open during use.
Storing Card Numbers in Paper Notes or Spreadsheets
Call centre staff and phone order operators sometimes write down card numbers on paper, enter them into spreadsheets, or save them in CRM systems before keying them into the virtual terminal. Any storage of cardholder data outside the virtual terminal — whether paper-based or electronic — violates PCI DSS requirements and may disqualify the merchant from SAQ C-VT. Train staff to enter card details directly into the virtual terminal during the call.
Not Securing the Device Used for Virtual Terminal Access
Even though the virtual terminal is hosted by a third party, the device used to access it must be properly secured. This includes keeping the operating system and browser patched, running anti-malware software, disabling unnecessary services, configuring a host-based firewall, and ensuring the device is on a segmented network. An unsecured device could be compromised and card data intercepted via keyloggers or screen capture malware.
Failing to Maintain Device Isolation Over Time
Even if a device is initially configured as isolated and dedicated, configuration drift can erode that isolation. Staff may install additional software, connect USB devices, or change network configurations. Regular audits of the virtual terminal device are essential to verify it remains isolated, dedicated, and compliant with SAQ C-VT requirements. Document the baseline configuration and check against it periodically.
How GRCTrack Helps with SAQ C-VT Compliance
SAQ C-VT Compliance — Frequently Asked Questions
Related PCI DSS Resources
Ready to Complete Your SAQ C-VT Assessment?
GRCTrack guides you through every SAQ C-VT requirement with step-by-step compliance workflows.