Skip to main content

PCI Scope Management

Last Updated: 2025-02-17 Status: Complete

Scope management is critical for efficient PCI compliance. The Cardholder Data Environment (CDE) and all connected systems are "in scope" and must meet PCI-DSS requirements. Reducing scope lowers compliance cost and risk.

Quick Reference

TermDefinition
CDESystems that store, process, or transmit cardholder data
In ScopeSystems that must meet PCI requirements
Connected SystemsSystems that can communicate with CDE
Out of ScopeSystems with no access to CDE

Cardholder Data Environment (CDE)

The CDE comprises all system components involved in handling cardholder data:

What's In Scope

CategoryExamplesWhy In Scope
Direct SystemsPayment gateway, card databaseStore/process/transmit CHD
Connected SystemsAuth servers, logging systemsCan access CDE
Security SystemsFirewalls, IDS/IPSProtect CDE
Admin SystemsJump hosts, management consolesAccess to CDE

v4.0 Scope Expansion

PCI DSS v4.0 expanded scope to include client-side components:

RequirementNew Scope
6.4.3All scripts on payment pages
11.6.1Client-side script monitoring

This means JavaScript and third-party trackers on payment pages are now in scope.

Scope Reduction Strategies

Strategy 1: Network Segmentation

Isolate the CDE from other networks to limit scope:

Segmentation Requirements:

  • No direct communication between CDE and out-of-scope systems
  • Firewalls/ACLs enforcing segmentation
  • Annual validation by QSA
  • Level 1 service providers: validation every 6 months

Strategy 2: Tokenization

Replace cardholder data with tokens to move systems out of scope:

Tokenization Impact:

  • Systems handling only tokens are OUT of scope
  • Token vault and generation remain IN scope
  • Significantly reduces compliance footprint

Learn more: Tokenization

Strategy 3: P2PE (Point-to-Point Encryption)

Encrypt data at the point of interaction, keeping it encrypted until secure decryption:

P2PE Impact:

  • Merchant systems that only pass encrypted data are reduced scope
  • SAQ P2PE has only 33 questions vs. 251+ for SAQ D
  • Must use PCI-validated P2PE solution

Strategy 4: Outsourcing

Move cardholder data handling to a compliant third party:

ApproachScope ImpactRequirements
Hosted payment pageOut of scopeValidate provider compliance
Payment gatewayOut of scopeValidate provider compliance
Tokenization serviceOut of scopeValidate provider compliance

Determining Scope

Scope Assessment Process

Scope Documentation Requirements

DocumentPurposeFrequency
Network diagramShow all CDE connectionsContinuous update
Data flow diagramShow cardholder data movementAnnual review
System inventoryList all in-scope systemsContinuous update
Scope validationConfirm scope is accurateAnnual (QSA review)

Connected System Categories

Category 1: Security Systems

Systems that provide security for the CDE:

System TypeWhy In ScopeExample
FirewallsControl CDE trafficPalo Alto, Cisco ASA
IDS/IPSMonitor CDESnort, Suricata
SIEMLog CDE eventsSplunk, ELK
Vulnerability scannersTest CDEQualys, Tenable

Category 2: Administrative Systems

Systems used to manage the CDE:

System TypeWhy In ScopeMitigation
Jump hostsAccess CDE systemsDedicated, hardened
AD/LDAPAuthenticate CDE usersSegment or use dedicated
Configuration managementDeploy to CDEDedicated tooling

Category 3: Supporting Systems

Systems that could impact CDE security:

System TypeWhy In ScopeAlternative
DNSResolve CDE hostnamesUse dedicated DNS
NTPSync CDE clocksDedicated NTP
DHCPAssign CDE IPsStatic IPs in CDE

Common Scope Mistakes

MistakeImpactSolution
No segmentationEverything in scopeImplement network isolation
Flat networkLateral movement possibleSegment by function
Shared credentialsAdmin systems in scopeDedicated CDE accounts
Logging to shared SIEMSIEM in scopeDedicated security logging
Backup to shared systemBackup system in scopeDedicated CDE backup
Cloud confusionUnclear shared responsibilityDocument cloud boundaries

Cloud Scope Considerations

Shared Responsibility Model

Cloud Scope by Service Model

ModelProvider ScopeCustomer Scope
IaaSInfrastructureOS, apps, data
PaaSInfrastructure + platformApps, data
SaaSEverythingData handling

Scope Reduction ROI

Cost Comparison

MetricFull Scope (100 systems)Reduced Scope (10 systems)
Annual assessment$150,000-250,000$50,000-75,000
Remediation$100,000-500,000$25,000-75,000
Ongoing maintenance$200,000-400,000/year$50,000-100,000/year
Breach exposureVery highContained

Implementation Investment

StrategyImplementation CostAnnual Savings
Segmentation$50,000-150,000$100,000-300,000
Tokenization$100,000-300,000$150,000-400,000
P2PE$25,000-100,000$100,000-200,000

Scope Validation Process

Annual Validation

StepActivityDocumentation
1Review network diagramsUpdated diagrams
2Verify segmentation controlsFirewall rule review
3Validate data flowsData flow diagrams
4Test segmentation effectivenessPenetration test results
5Document scope determinationScope statement

QSA Scope Review

AreaQSA Validation
Network architectureReview diagrams, verify controls
System inventoryConfirm all in-scope systems
Data flowsVerify CHD paths
SegmentationTest control effectiveness
Third partiesValidate provider compliance

References

Share: