Back to Resources
Industry Guide

PCI DSS Compliancefor Financial Services

A comprehensive guide for banks, fintechs, and financial institutions navigating PCI DSS compliance. From core banking integration to ATM networks, mobile banking to open banking APIs, understand the requirements for the highest levels of payment security.

Overview

Financial institutions sit at the centre of the payment card ecosystem. As card issuers, acquirers, processors, and service providers, banks and fintechs handle cardholder data at a scale and with a criticality that demands the highest levels of PCI DSS compliance. Most financial institutions operate as Level 1 service providers, subject to the full set of PCI DSS requirements and mandatory annual assessment by a Qualified Security Assessor (QSA), resulting in a Report on Compliance (ROC).

The financial services PCI landscape is uniquely complex because the institution often plays multiple roles simultaneously. A bank may be an issuer (producing cards with PANs), an acquirer (processing merchant transactions), and a service provider (offering payment processing APIs to third parties). Each role has different PCI scope implications and different interaction patterns with the card brands. Understanding which requirements apply to which role, and how systems supporting multiple roles overlap, is foundational to an effective compliance programme.

Fintech companies face additional challenges: rapid development cycles, cloud-native architectures, open banking API requirements, and regulatory expectations that extend beyond PCI DSS to include banking regulators, anti-money-laundering rules, and data protection laws. Building PCI compliance into the product development lifecycle from day one is far more cost-effective than retrofitting it later.

Key Challenges for Financial Services

1. Core Banking System Integration

Core banking platforms are typically monolithic systems that have been in operation for decades, often running on mainframes with COBOL codebases. These systems store PANs, manage account data, process authorisations, and interface with card networks. Bringing a core banking system into PCI DSS compliance requires navigating legacy code that may not support modern encryption standards, mainframe security configurations that predate PCI DSS, and change management processes designed for stability rather than agility. Requirement 6 (secure development) must be adapted to cover mainframe development practices, while Requirement 3 (stored data protection) may require significant architectural changes to encrypt PANs that have historically been stored in plaintext.

2. ATM Network Security

ATM networks represent a distributed, physically exposed attack surface. Each ATM processes card-present transactions, handles PIN entry, and communicates with the bank's authorisation host over private or semi-private networks. ATMs are targets for physical skimming, network man-in-the-middle attacks, and software exploitation. PCI DSS requires that ATMs run supported operating systems (many still run Windows embedded versions nearing end-of-life), use strong encryption for PIN blocks (Requirement 4), and are physically inspected for tampering (Requirement 9.5). Managing a fleet of thousands of geographically dispersed ATMs while maintaining compliance across all of them requires centralised monitoring, automated patch management, and a robust physical security programme.

3. Mobile Banking and Digital Wallets

Mobile banking apps that display card numbers, enable card controls, or facilitate payments are firmly in PCI scope. The challenge is that mobile apps run on consumer devices that the institution does not control. PCI DSS Requirement 2 (secure configurations) cannot be enforced on a customer's personal phone. Instead, the institution must ensure that the app itself is hardened: sensitive data must not be stored in local storage (Requirement 3), communication must use certificate pinning and TLS 1.2+ (Requirement 4), and the app must be tested for vulnerabilities before each release (Requirement 6). Digital wallet provisioning (Apple Pay, Google Pay) introduces tokenisation flows that must be carefully scoped and documented.

4. Open Banking API Security

Open banking regulations (PSD2 in Europe, similar frameworks globally) require banks to expose customer account data, including card details in some implementations, to authorised third-party providers (TPPs) via APIs. These APIs must satisfy PCI DSS requirements for access control (Requirement 7), authentication (Requirement 8), encryption (Requirement 4), and logging (Requirement 10), while also meeting the specific security standards of the open banking framework (e.g., eIDAS certificates, OAuth 2.0 with FAPI profile). The intersection of PCI DSS and open banking security creates a complex compliance matrix where both sets of requirements must be satisfied simultaneously.

5. Card Issuance and Lifecycle Management

Issuing banks generate and manage PANs throughout the card lifecycle: issuance, activation, reissuance, and decommissioning. Card personalisation facilities (where data is written to the chip and magnetic stripe) are high-security environments with their own PCI standards (PCI Card Production). The generation of CVVs and PINs involves cryptographic processes that must be protected with HSMs and dual control. PCI DSS Requirements 3 and 4 are especially critical during issuance, but the full standard applies to all systems involved in the card lifecycle. PIN mailer production and distribution adds physical security requirements that extend the scope beyond the digital domain.

6. Fraud Detection and Transaction Monitoring

Fraud detection systems ingest massive volumes of transaction data, including full PANs and associated metadata, to identify suspicious patterns. These systems are squarely in PCI scope and often represent some of the largest data stores of cardholder information in the organisation. Machine learning models trained on card data must be developed and deployed within the CDE (Requirement 6), the training data must be protected (Requirement 3), and access to the fraud analytics platform must be restricted to authorised fraud analysts (Requirement 7). Data exports for model training or reporting must never contain unmasked PANs unless the destination system is also within PCI scope.

Level 1 Service Provider Requirements

Most financial institutions qualify as Level 1 service providers, which carries the most stringent validation requirements:

Annual Report on Compliance (ROC)

A full ROC conducted by a QSA is mandatory. Self-assessment questionnaires are not permitted for Level 1 SPs. The ROC covers all applicable PCI DSS requirements and results in a formal Attestation of Compliance (AOC) that customers and card brands rely upon.

Quarterly ASV Scanning

All internet-facing systems must be scanned quarterly by an Approved Scanning Vendor. Any failing scan must be remediated and rescanned within the quarter. For financial institutions with extensive internet-facing infrastructure, ASV scan management is a continuous operational process.

Semi-Annual Segmentation Testing (Req 11.4.5)

Service providers must validate network segmentation controls every six months, not just annually. This testing must confirm that segmentation isolation is effective and that systems outside the CDE cannot communicate with systems inside the CDE. Penetration testers must attempt to breach segmentation from both directions.

Semi-Annual Scope Reviews (Req 12.5.2.1)

Service providers must perform and document a formal scope review at least every six months, confirming all data flows, system components, and connections to third parties. Any changes to the environment since the last review must be documented and assessed for scope impact.

Cryptographic Architecture Documentation (Req 12.3.3)

Financial institutions must maintain a complete cryptographic cipher suite and protocol inventory, documenting every algorithm, key length, and protocol version in use across all in-scope systems. This inventory must be updated whenever cryptographic configurations change.

Integration Points and Scope Boundaries

Financial institutions interact with numerous external systems, each representing a scope boundary that must be assessed and documented:

Card Network Interfaces

Connections to Visa, Mastercard, Amex, and Discover networks for authorisation, clearing, and settlement. These are dedicated, encrypted links with strict security requirements from each card brand.

SWIFT / Payment Messaging

Interfaces with SWIFT for inter-bank messaging. SWIFT CSP requirements overlap with PCI DSS and must be managed in coordination. Shared infrastructure serving both SWIFT and card processing expands scope.

Third-Party Processors

Connections to payment processors, acquirers, and clearing houses. Each third party must maintain its own PCI DSS compliance. Due diligence, AOC verification, and contractual security requirements are mandatory (Requirement 12.8).

Merchant Integration APIs

APIs exposed to merchants for payment acceptance, reporting, and settlement. These are internet-facing and must be secured with strong authentication, rate limiting, input validation, and comprehensive logging.

Open Banking / TPP APIs

APIs exposed to authorised third-party providers under open banking regulations. Must satisfy both PCI DSS and regulatory security standards. OAuth 2.0 with FAPI profile, certificate-based auth, and consent management.

Mobile App Back-End

APIs serving mobile banking applications. Must handle authentication, session management, and data protection for card details displayed in-app. Certificate pinning and app-level security controls are essential.

Required Controls for Financial Services

HSM-Backed Cryptography

Hardware security modules for all PIN translation, CVV generation, and key management operations. FIPS 140-2 Level 3 or higher certification required.

Multi-Layer Network Defence

Defence-in-depth with DMZs, internal firewalls, micro-segmentation, and network-level encryption. Zero-trust architecture principles applied to all CDE access.

Privileged Access Management

Just-in-time access for administrators, session recording, dual-control for critical operations, and automated credential rotation via a PAM solution.

24/7 SOC Monitoring

Security operations centre with real-time monitoring, automated alerting, and defined response procedures. SIEM ingesting logs from all in-scope systems.

Secure SDLC

Security integrated into every phase of the software development lifecycle: threat modelling, secure coding standards, SAST/DAST, dependency scanning, and security sign-off.

Comprehensive BCP/DR

Business continuity and disaster recovery plans tested at least annually. Recovery time objectives (RTOs) aligned with payment network requirements. Failover tested end-to-end.

Implementation Checklist

  1. 1Define and document all roles within the payment ecosystem: issuer, acquirer, processor, service provider. Map PCI DSS requirements to each role.
  2. 2Conduct a comprehensive cardholder data discovery exercise across core banking, ATM, mobile, web, and API channels to identify all locations where CHD resides
  3. 3Establish a formal PCI programme governance structure with executive sponsorship, a dedicated compliance team, and defined escalation paths
  4. 4Deploy HSMs for all cryptographic operations involving PINs, CVVs, and encryption keys. Validate FIPS 140-2 certification for all HSM devices.
  5. 5Implement network segmentation with defence-in-depth: external DMZ, application tier, database tier, and management network, each with firewall controls
  6. 6Secure mobile banking applications with certificate pinning, jailbreak detection, secure local storage, and automated SAST/DAST in the release pipeline
  7. 7Document all open banking API endpoints that handle card data and ensure both PCI DSS and regulatory security requirements are satisfied
  8. 8Establish a privileged access management programme with just-in-time access, session recording, and automated credential rotation
  9. 9Configure centralised logging from all in-scope systems to a SIEM with 24/7 SOC monitoring and defined alerting rules for suspicious activity
  10. 10Schedule semi-annual segmentation penetration testing and formal PCI scope reviews as required for Level 1 service providers
  11. 11Maintain a cryptographic inventory documenting all algorithms, key lengths, protocols, and certificate lifetimes across all in-scope systems
  12. 12Engage a QSA with financial services and fintech assessment experience for your annual ROC and maintain continuous compliance readiness between assessments

Quick Facts

Industry
Banking / Fintech
Classification
Level 1 Service Provider
Validation
Annual ROC by QSA
Additional Standards
PCI PIN, PCI Card Prod., SWIFT CSP

Key Statistics

$5.90M

average cost of a financial services data breach (2025)

300+

PCI DSS requirements applicable to Level 1 service providers

6 months

maximum interval for segmentation testing and scope reviews

35%

of financial institutions report PCI scope expansion year-over-year

Get Started with GRCTrack

Enterprise-grade compliance for financial institutions. Manage Level 1 ROC assessments, track remediation across business units, and maintain continuous compliance readiness.