NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
December 24, 2018

4 Questions to Determine Which PCI DSS Self-Assessment Questionnaire (SAQ) to Complete

Jeffrey Bamberger Jeffrey Bamberger

Now that you've decided to create/configure your business to accept credit cards as a form of payment, you may be curious what impact that decision will have on your business operations. Working towards aligning your policies, procedures, standards, and controls with the requirements set forth in the Payment Card Industry Data Security Standard (PCI DSS) can be quite adventurous. You'll need to make sometimes agonizing choices about how best to protect the cardholder data that you either store, process, or transmit. You might even question the decision to accept credit card payments. Are the benefits derived from accepting credit card transactions worth the headaches?

I can't answer that question for you, but I can emphatically tell you this: If your business model includes accepting credit card payments, you have the responsibility to periodically validate that your suite of controls remains in compliance with the PCI DSS. If your respective acquirer or payment brand does not require you to submit a PCI DSS Report on Compliance (ROC), then you are eligible to evaluate your compliance utilizing a self-assessment questionnaire (SAQ). However, there are multiple versions of the PCI DSS SAQs to meet various scenarios. I have seen many of our customers struggle with the same challenge: Which SAQ should I complete? When determining which SAQ is right for your organization, technical details matter!

The following are some of the core questions you will have to ask yourself in determining which SAQ to select for your self-assessment:

1. Are you a mail order, telephone, or e-commerce merchant that does not accept physical credit card payments (often referred to as “card not present transactions”) and has fully outsourced your payment processing to a PCI DSS compliant service provider?

  • If yes, you should select SAQ A if you do not directly store, process, or transmit cardholder data. In this scenario, the transaction is passed directly to the payment processor by a website iFrame or is fully redirected to the payment processor.
  • If you accept e-commerce transactions which are outsourced but your website delivers some elements of the payment page, you should select SAQ A-EP.
2. Do you process transactions only via imprint or dial-out machines or via approved PIN transaction security (PTS) devices?
  • If yes, and your device has internet access (i.e., is assigned an IP), you should select SAQ B-IP.
  • If yes, but your device doesn’t have internet access, you should select SAQ B.
3. Do you process transactions via a payment application connected to the internet AND you are not an e-commerce merchant?
  • If yes, and transactions are processed via a payment application on a Point of Sale (POS) terminal or a PC with an internet connection, you should select SAQ C.
  • If yes, and transactions are processed via your web browser sending to a service provider’s virtual payment application, you should select SAQ C-VT.
4. If you answered no to all of the above questions, then there is the “catch all” of SAQ D. In addition, if you are a payment processing service provider or you store any cardholder data, then you should select SAQ D.

As noted at the beginning of this blog, there can be agonizing choices to make when it comes to implementing controls and validating your PCI compliance. Selecting an improper self-assessment questionnaire for your PCI DSS compliance efforts will likely lead to additional work on your part after your acquirer and/or payment brand reviews your submitted SAQ. You can't avoid choosing a SAQ. And don’t forget that all of this is subject to change if the DSS is changed in any way. This blog was created with PCI DSS v3.2.1 in place.

As a wise, old knight once said to a swashbuckling adventurer seeking the Holy Grail: “Choose wisely.”

If you are still unclear about which SAQ to complete, NuHarbor can help. Contact us today! 

You can also visit our website to see our available PCI services:

https://nuharborsecurity.com/pci-compliance

Other helpful PCI DSS links:

https://www.pcisecuritystandards.org/

https://www.pcisecuritystandards.org/documents/SAQ-InstrGuidelines-v3_2.pdf

Included Topics

  • Compliance,
  • Security Testing
Jeffrey Bamberger
Jeffrey Bamberger

Jeffrey Bamberger is the Principal Advisor for Information Assurance at NuHarbor Security. Jeff brings over 30 years in cybersecurity and information technology experience, focusing on consulting, risk management, compliance, and audit. Jeff's broad consulting experiences include cyber risk/threat management and assessment, information security control assessments, payment card industry (PCI) compliance, social engineering and physical security, privacy, vendor management, and Sarbanes-Oxley compliance. A graduate of the F.W. Olin Graduate School of Business at Babson College, he holds a Master of Business Administration degree. Jeff also has a Bachelor of Arts in Computer Science and Religion from Colgate University. He is a current member of the New England Chapter of the Information Systems Audit and Control Association and holds both a CISA and CISM certification.

Related Posts

Security Operations 2 min read
2 Questions to Determine if a Security Program Review or Security Assessment is Better for Your Company Read More
2 min read
1 Risk Assessment Question to Grab the Attention of your Leadership Team. Read More
Compliance 4 min read
6 Requirements in PCI DSS 3.0 That You Should Plan For Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.