PCI-DSS v4.0 Compliance. Forged from Security Posture.
PCI-DSS Compliance Platform
12 requirement families across 6 security goals. Cardholder data environment scoped from live infrastructure discovery. Continuous evidence collection replaces annual documentation cycles. Defined Approach and Customized Approach supported. Immutable compliance proofs for your QSA. v4.0 mandatory since March 31, 2025.
PCI-DSS Compliance
Security posture generates compliance proofs. Not the other way around.
PCI-DSS v4.0 requires organizations to protect cardholder data through 12 requirement families validated by a Qualified Security Assessor. Most organizations pursue validation backward: documentation first, evidence collection second, infrastructure hardening last. Redoubt Forge inverts that sequence. Start with actual defenses; the platform observes your security posture, maps it to every PCI-DSS requirement, scores controls from live data, and generates immutable compliance proofs for your QSA or Self-Assessment Questionnaire.
The Payment Card Industry Data Security Standard (PCI-DSS) exists because voluntary security practices failed to protect cardholder data at scale. In 2004, Visa, Mastercard, American Express, Discover, and JCB founded the PCI Security Standards Council (PCI SSC) to establish a unified security standard for any organization that stores, processes, or transmits cardholder data. Before PCI-DSS, each card brand maintained its own security program with different requirements, different assessment methodologies, and different enforcement mechanisms. The resulting fragmentation meant merchants and service providers faced conflicting obligations with no consistent baseline. PCI-DSS consolidated those programs into a single standard with versioned requirements, accredited assessors, and a structured validation process. The standard has evolved through multiple versions: v1.0 in 2004, v2.0 in 2010, v3.0 in 2013, v3.2.1 in 2018, and v4.0 published in March 2022. Version 3.2.1 was sunset on March 31, 2024, and v4.0 became the only active version. The future-dated requirements in v4.0 became mandatory on March 31, 2025. Organizations still operating under v3.2.1 assumptions are now non-compliant.
PCI-DSS applies to every entity in the payment card processing chain. This includes merchants of all sizes, payment processors, acquiring banks, issuing banks, and service providers that store, process, or transmit cardholder data or that could affect the security of cardholder data. The standard defines four merchant levels based on annual transaction volume. Level 1 merchants (over 6 million transactions annually) must undergo an annual on-site assessment by a Qualified Security Assessor (QSA) and produce a Report on Compliance (ROC). Level 2 merchants (1 to 6 million transactions) must complete a Self-Assessment Questionnaire (SAQ) annually, though acquiring banks may require a QSA assessment. Level 3 (20,000 to 1 million e-commerce transactions) and Level 4 (fewer than 20,000 e-commerce or up to 1 million other transactions) complete SAQs appropriate to their payment acceptance methods. Service providers have separate classification levels: Level 1 service providers (over 300,000 transactions or those on card brand registries) require annual QSA assessments. The validation method varies, but the security requirements are identical across all levels. A Level 4 merchant must satisfy the same 12 requirements as a Level 1 merchant. The difference is how compliance is verified, not what compliance requires.
Version 4.0 introduced the most significant structural changes since the standard's inception. The Customized Approach allows organizations to meet security objectives through alternative controls rather than following the prescriptive requirements of the Defined Approach. This flexibility acknowledges that emerging technologies and architectures may satisfy security objectives through means the standard's authors did not anticipate. Authentication requirements expanded significantly: multi-factor authentication is now required for all access to the cardholder data environment (CDE), not just remote access. Password requirements increased to a minimum of 12 characters. Encryption requirements broadened to cover data at rest in all storage locations, not just primary databases. Targeted risk analysis became a formal requirement, replacing the previous approach of applying uniform controls regardless of threat context. Organizations must now perform documented risk analyses for specific requirements and implement controls proportional to the identified risk. These changes reflect the PCI SSC's recognition that static, prescriptive security controls cannot keep pace with evolving threats. v4.0 shifts the standard toward outcome-based security while maintaining the structured validation model that makes PCI-DSS enforceable.
The annual validation cycle is PCI-DSS compliance's structural weakness. An organization achieves compliance on the day of its assessment. The ROC or SAQ describes the environment as it existed during that assessment window. Within weeks, infrastructure changes. Firewall rules are modified to accommodate new business requirements. New applications are deployed into the cardholder data environment without updating network diagrams or data flow documentation. Service accounts are created with broader permissions than policy allows. Encryption configurations are adjusted during troubleshooting and never restored. Patch cycles slip. Log retention policies are not enforced. By the third month after validation, the environment described in the compliance documentation no longer matches the running infrastructure. By the sixth month, the divergence is substantial. By the eleventh month, the organization faces the same scramble it endured the previous year: re-documenting the environment, re-collecting evidence, re-verifying configurations, and hoping that the gaps discovered during preparation can be closed before the QSA arrives. This cycle repeats annually, consuming months of engineering time without producing lasting security improvement.
CDE scope creep is the silent threat that undermines PCI-DSS programs between assessments. Cardholder data has a tendency to appear in unexpected places. A developer copies production data to a staging environment for debugging. A customer service application logs full card numbers in error messages. A backup system replicates cardholder data to storage outside the defined CDE boundary. An integration partner receives card data through an API that was not included in the original data flow diagram. Each of these events expands the actual CDE beyond the documented scope. Systems that handle cardholder data outside the defined boundary receive no security controls, no monitoring, no evidence collection, and no QSA scrutiny. The organization's compliance documentation describes a CDE that is smaller than reality. The gap between documented scope and actual scope is where breaches occur. Attackers do not target the systems you monitor most carefully. They target the systems you forgot to include.
The financial consequences of a PCI-DSS breach extend far beyond the cost of incident response. Card brands impose fines ranging from $5,000 to $100,000 per month for non-compliance, with escalation based on the severity and duration of the violation. Acquiring banks may increase transaction processing fees or terminate the merchant relationship entirely. The compromised organization bears the cost of forensic investigation by a PCI Forensic Investigator (PFI), which typically costs $200,000 to $500,000 depending on the scope of the breach. Card reissuance costs are charged back to the breached entity: at $3 to $10 per card, a breach affecting 500,000 cardholders creates $1.5 million to $5 million in reissuance liability alone. Regulatory fines from state attorneys general, the FTC, or international data protection authorities compound the card brand penalties. Class action litigation from affected cardholders adds another layer of exposure. Beyond the direct financial impact, the reputational damage affects customer acquisition and retention for years. Organizations that treat PCI-DSS as an annual documentation exercise rather than a continuous security obligation discover the true cost of that approach when a breach occurs.
PCI-DSS v4.0 organizes its requirements under six security goals that form the logical structure of payment card protection. Build and Maintain a Secure Network and Systems covers Requirement 1 (Install and Maintain Network Security Controls) and Requirement 2 (Apply Secure Configurations to All System Components). Protect Account Data covers Requirement 3 (Protect Stored Account Data) and Requirement 4 (Protect Cardholder Data with Strong Cryptography During Transmission). Maintain a Vulnerability Management Program covers Requirement 5 (Protect All Systems and Networks from Malicious Software) and Requirement 6 (Develop and Maintain Secure Systems and Software). Implement Strong Access Control Measures covers Requirement 7 (Restrict Access to System Components and Cardholder Data by Business Need to Know), Requirement 8 (Identify Users and Authenticate Access to System Components), and Requirement 9 (Restrict Physical Access to Cardholder Data). Regularly Monitor and Test Networks covers Requirement 10 (Log and Monitor All Access to System Components and Cardholder Data) and Requirement 11 (Test Security of Systems and Networks Regularly). Maintain an Information Security Policy covers Requirement 12 (Support Information Security with Organizational Policies and Programs).
Each of the 12 requirements decomposes into specific sub-requirements with defined testing procedures. Requirement 1 mandates network security controls (firewalls, network segmentation, access control lists) that restrict traffic between trusted and untrusted networks, with specific rules governing inbound and outbound traffic to the CDE. Requirement 3 specifies that stored account data must be rendered unreadable using strong cryptography, truncation, tokenization, or one-way hashing, with explicit rules for primary account numbers, expiration dates, service codes, and sensitive authentication data. Requirement 8 requires multi-factor authentication for all personnel with access to the CDE, minimum 12-character passwords, account lockout after 10 failed attempts, and session timeout after 15 minutes of inactivity. Requirement 10 mandates audit trails that record all access to cardholder data, all actions taken by any individual with root or administrative privileges, access to all audit trails, invalid logical access attempts, and use of identification and authentication mechanisms. Requirement 11 requires quarterly internal vulnerability scans, quarterly external scans by an Approved Scanning Vendor (ASV), annual penetration testing, and change-detection mechanisms on critical files. These are not guidelines. They are specific, testable requirements with defined pass/fail criteria.
Version 4.0 expanded the sub-requirement structure significantly and introduced the Customized Approach as an alternative to the traditional Defined Approach for meeting each requirement's security objective. Under the Defined Approach, the organization implements the specific controls described in the standard and provides evidence that matches the defined testing procedures. Under the Customized Approach, the organization proposes alternative controls that meet the same security objective, performs a targeted risk analysis documenting why the alternative satisfies the objective, and submits both the control description and the risk analysis for QSA evaluation. Not every sub-requirement supports the Customized Approach; some are designated as Defined Approach only. v4.0 also added future-dated requirements that were recommended best practices during the transition period but became mandatory on March 31, 2025. These include automated mechanisms for reviewing audit logs (10.4.1.1), detecting and protecting personnel against phishing attacks (5.4.1), and managing all payment page scripts that are loaded and executed in the consumer's browser (6.4.3 and 11.6.1). Organizations that deferred these requirements during the transition period must now demonstrate full implementation.
Scoping defines the assessment boundary: every system, network segment, application, and data store that comprises the Cardholder Data Environment. The CDE includes all system components that store, process, or transmit cardholder data, plus any component on the same network segment as those systems. PCI-DSS v4.0 defines three categories of in-scope systems. CDE systems directly handle cardholder data: payment applications, databases storing primary account numbers, encryption/decryption systems, and network paths that carry card data. Connected-to systems do not store or process cardholder data directly but have network connectivity to CDE systems: jump servers, management consoles, DNS servers, and monitoring infrastructure that communicates with CDE components. Security-impacting systems could affect the security of the CDE even without direct connectivity: authentication servers, patch management systems, anti-malware management consoles, and log aggregation platforms. Every system in all three categories falls within the PCI-DSS assessment boundary. Scoping errors propagate through the entire compliance program. A CDE system omitted from scope receives no security controls, no monitoring, and no QSA verification.
Network segmentation is the primary mechanism for constraining CDE scope. Without segmentation, the entire network is in scope. Every server, workstation, network device, and application on the flat network must satisfy all applicable PCI-DSS requirements. Effective segmentation isolates cardholder data flows into a defined network segment with controlled ingress and egress points. Only traffic required for payment processing traverses the CDE boundary. Segmentation must be validated annually (or after any change to segmentation controls) through penetration testing that specifically targets segmentation effectiveness. The penetration test must confirm that systems outside the CDE cannot access systems within it through any path, including misconfigured firewall rules, routing errors, VLAN hopping, and application-layer tunneling. Cloud environments add complexity: virtual network boundaries, security groups, and cloud-native firewalls must enforce the same isolation guarantees as physical network segmentation. Shared services that span CDE and non-CDE segments (load balancers, logging pipelines, identity providers) pull those services into scope and require careful architectural decisions about where the boundary falls.
Sentinel discovers data flows across your connected infrastructure, enumerating every resource, network path, and service interaction. When Sentinel identifies systems handling cardholder data outside the declared CDE boundary, the platform flags a potential scope gap. When Sentinel finds systems inside the boundary with no cardholder data flow justification, it flags those as candidates for scope reduction. Garrison displays the discovered estate as a live inventory, showing every component that Sentinel has enumerated and its relationship to the declared CDE. Rampart captures the formal scope definition: system description, CDE boundary documentation, data flow diagrams, and the categorization of every component as CDE, connected-to, or security-impacting. Artificer guides the scoping process by asking targeted questions: Where does cardholder data enter your environment? Through which channels? Where is it stored? How is it transmitted? Where does it exit? Artificer adapts its questions based on what Sentinel has discovered, ensuring that the documented scope reflects the actual infrastructure rather than an idealized architecture diagram drawn months ago.
Gap assessment evaluates your organization against all applicable PCI-DSS v4.0 requirements before you engage a Qualified Security Assessor or submit a Self-Assessment Questionnaire. For each requirement and sub-requirement, the assessment determines: is the control implemented, partially implemented, or not implemented? What evidence exists to prove it? Is that evidence current, or has it degraded since collection? The gap assessment must be honest and thorough. Organizations that allow optimism to inflate their self-reported status enter formal validation unprepared. A QSA engagement for a Level 1 merchant costs tens of thousands of dollars. Discovering fundamental gaps during that engagement is the most expensive way to find them. The gap assessment must also determine which approach the organization will use for each requirement: the Defined Approach with its prescriptive controls and testing procedures, or the Customized Approach with alternative controls and targeted risk analysis documentation. This decision affects evidence requirements, assessor expectations, and the depth of documentation needed for each requirement.
The gap assessment must account for the distinction between the Defined Approach and the Customized Approach at the sub-requirement level. Under the Defined Approach, the assessor tests against specific, prescriptive criteria: does the firewall configuration include deny-all rules for undefined traffic, are audit logs retained for 12 months with 3 months immediately available, are vulnerability scans performed quarterly and after significant changes. Under the Customized Approach, the assessor evaluates whether the organization's alternative control meets the security objective stated for that requirement, supported by a documented targeted risk analysis. The risk analysis must identify the specific threat being addressed, evaluate the effectiveness of the alternative control against that threat, and document the rationale for why the alternative is at least as effective as the prescriptive requirement. Not every sub-requirement supports the Customized Approach. Requirements that are strictly procedural or that define minimum thresholds (password length, retention periods, scan frequencies) are Defined Approach only. The gap assessment must correctly classify each requirement and evaluate against the appropriate criteria.
Rampart derives all applicable PCI-DSS v4.0 requirements from your system's CDE scope and maps them to your connected infrastructure. Each requirement is scored across three independent dimensions. Defense effectiveness measures whether the control is actually working: is encryption active on cardholder data storage, are network security controls enforcing CDE boundary rules, are audit logs being generated and retained for the required period? Evidence coverage measures what artifacts prove it: configuration snapshots from connected infrastructure, scan results from Vanguard, policy documents, access review logs, penetration test reports, ASV scan results. Evidence freshness measures how current that proof is: a firewall rule snapshot from last week carries more weight than one from six months ago. These three signals combine into a confidence score that updates continuously as the platform ingests new data. A requirement might have strong defenses but stale evidence, or current evidence that reveals a degraded defense. The three-dimensional scoring surfaces these distinctions rather than collapsing everything into a binary pass/fail that obscures the underlying risk.
Remediation closes the gaps identified during assessment. Effective remediation is not a flat list of findings sorted by severity. It requires prioritization that accounts for cross-requirement dependencies, infrastructure prerequisites, and the relative impact of each gap on overall security posture. Some gaps affect multiple requirement families: a missing network segmentation control impacts Requirement 1 (network security), Requirement 7 (access restriction), and Requirement 11 (segmentation validation testing). Some gaps require infrastructure changes that take weeks to implement and test. Some require only policy documentation and management approval. Some have dependencies: you cannot implement file integrity monitoring (Requirement 11.5) without first establishing a baseline configuration (Requirement 2.2). You cannot configure audit trail review automation (Requirement 10.4.1.1) without first deploying centralized logging (Requirement 10.3). The sequence of remediation matters. Resource allocation across competing priorities matters. Organizations that treat remediation as an undifferentiated task list spend effort on low-impact items while high-impact gaps remain open.
The most common PCI-DSS remediation areas follow predictable patterns. Network segmentation deficiencies require architectural changes to isolate the CDE: deploying network security controls, configuring access control lists, establishing monitoring at ingress and egress points, and validating segmentation through targeted penetration testing. Encryption gaps require implementing strong cryptography for cardholder data at rest and in transit, establishing key management procedures, and configuring certificate lifecycle management. Access control deficiencies require deploying multi-factor authentication for all CDE access, implementing role-based access with business need-to-know restrictions, configuring account lockout and session timeout parameters, and establishing access review procedures. Monitoring gaps require deploying audit trail collection for all CDE components, configuring log retention for 12 months with 3 months immediately available, establishing automated log review mechanisms, and implementing change-detection processes for critical files. Each remediation action must produce evidence that satisfies the specific testing procedure defined for that requirement.
Citadel's action queue ranks every open gap by posture impact: how many requirements does closing this gap satisfy, and how does it affect your overall compliance readiness? Artificer identifies prerequisite relationships between requirements and recommends remediation sequences that maximize compliance progress per unit of effort. Armory provides hardened Terraform modules that satisfy PCI-DSS requirements from the first deployment. An encryption module that satisfies Requirement 3 by configuring storage-level and transit-level encryption with key management policies. A logging module that satisfies Requirement 10 by deploying centralized audit trail collection with tamper-evident storage, 12-month retention, and automated review mechanisms. A network segmentation module that satisfies Requirement 1 by establishing CDE boundaries with deny-by-default ingress rules, controlled egress paths, and segmentation validation hooks. These are deployable infrastructure code, not templates. Deploy the module, and the requirement is satisfied by design. Sentinel monitors every remediation action and re-evaluates affected requirements as changes take effect. For certain drift scenarios, Sentinel can auto-remediate after approval: if a storage encryption configuration is disabled, Sentinel detects the drift and restores the compliant state within your defined change windows.
PCI-DSS validation takes two primary forms depending on merchant level and transaction volume. Level 1 merchants and Level 1 service providers must undergo an annual on-site assessment by a Qualified Security Assessor (QSA), resulting in a Report on Compliance (ROC). The ROC documents the QSA's findings for every applicable requirement: whether the control is in place, what evidence was examined, what testing procedures were performed, and the compliance status for each sub-requirement. The ROC is submitted to the acquiring bank and, through the acquiring bank, to the card brands. Level 2 through Level 4 merchants complete a Self-Assessment Questionnaire (SAQ) appropriate to their payment acceptance method. There are nine SAQ types (A, A-EP, B, B-IP, C, C-VT, D for merchants, D for service providers, and P2PE), each covering a different subset of requirements based on how the merchant accepts and processes payments. Selecting the wrong SAQ type is a common error that results in either over-assessment (wasted effort on inapplicable requirements) or under-assessment (missing applicable requirements that the QSA or acquiring bank will flag).
Preparation for QSA assessment requires compiling requirement narratives (implementation descriptions for each applicable requirement that explain how the organization satisfies it), cross-referencing evidence artifacts to each requirement and sub-requirement, confirming remediation status for known gaps, identifying personnel who will participate in interviews for each requirement family, and documenting operational processes for observation. The QSA evaluates each requirement against four possible outcomes: In Place (the requirement is fully implemented and operating as described), In Place with Compensating Control (the requirement is met through an alternative control with documented justification), Not Applicable (the requirement does not apply based on the organization's environment), and Not in Place (the requirement is not implemented or evidence is insufficient). The quality of evidence preparation determines the assessment's pace and outcome. QSAs who receive organized evidence packages with clear requirement-to-evidence mappings complete their review efficiently. QSAs who receive disorganized artifacts spend weeks requesting clarification. That delay costs the organization, not the QSA.
Rampart produces assessment-ready evidence packages organized by requirement family. All network security control requirements with their implementation narratives, evidence cross-references, and scoring status appear in one view. All access control requirements in another. All monitoring and testing requirements in another. Each narrative is generated by Artificer from observed infrastructure state. The narrative for Requirement 1.2.1 does not say "network security controls restrict traffic." It describes which specific controls enforce the CDE boundary, which rules are configured, which traffic is permitted, and which evidence artifacts demonstrate enforcement. Alliance grants your QSA time-bound, read-only access to Rampart. The assessor navigates your controls, evidence, findings, and narratives independently without relying on your team to pull artifacts on demand during the assessment. They can view every requirement, drill into the evidence chain for each, examine the scoring methodology, and download artifacts for their own records. Every action the assessor takes within Alliance is logged, creating a chain of custody for the assessment itself. The assessor receives verifiable proof from running systems, organized by requirement family, with immutable evidence chains and complete provenance.
Achieving PCI-DSS compliance marks the start of an ongoing obligation, not the end of a project. The standard explicitly requires continuous compliance, not point-in-time compliance. Multiple requirements mandate recurring activities between annual validations. Requirement 11.3.1 requires quarterly internal vulnerability scans. Requirement 11.3.2 requires quarterly external vulnerability scans by an Approved Scanning Vendor (ASV). Requirement 11.4 requires annual penetration testing and segmentation validation testing (every six months for service providers). Requirement 5 requires continuous malware protection with regular signature updates. Requirement 10.4.1.1 requires automated mechanisms to review audit logs. Requirement 6.3.1 requires tracking and managing vulnerabilities from identification through remediation. Requirement 12.4 (for service providers) requires quarterly reviews confirming that personnel are following security policies and operational procedures. These are not recommendations. They are testable requirements with defined frequencies that the next QSA assessment will evaluate for compliance across the entire preceding year.
Between annual validations, the same forces that create compliance gaps before the first assessment continue to operate. Infrastructure changes as new business requirements emerge. Personnel turn over, taking institutional knowledge about control implementations with them. New applications are deployed into or adjacent to the CDE. Payment processing flows evolve as the organization adopts new channels, partners, or technologies. Each change has the potential to affect compliance status. A new application deployed into the CDE expands the scope of Requirements 2 (secure configuration), 6 (secure development), 7 (access control), 8 (authentication), and 10 (logging). A change to network architecture affects Requirement 1 (network security controls) and Requirement 11 (segmentation validation). Without continuous monitoring, these changes create compliance gaps that accumulate silently until the next assessment cycle reveals them. The organization then faces the same evidence scramble it experienced before initial validation, compounded by 12 months of untracked changes.
Sentinel maintains continuous evidence streams from every connected infrastructure source within the CDE. When a configuration changes on a monitored resource, Sentinel evaluates the compliance impact immediately: which requirements does this resource support, and does the new configuration still satisfy them? If a firewall rule is modified, Sentinel maps that change to Requirement 1 and flags the potential impact. If an encryption configuration is altered, Sentinel maps it to Requirement 3 and Requirement 4. Drift detection fires in real time, not on the next quarterly review cycle. Rampart recalculates requirement scores as drift events arrive, maintaining an accurate view of compliance status between assessments. Evidence freshness automation prevents gaps from forming: when evidence approaches its expiration threshold, Sentinel re-collects from continuous sources automatically. For evidence that requires human action (annual policy reviews, quarterly access certifications, penetration test scheduling), the platform escalates through notifications with increasing urgency as deadlines approach. When your next annual validation begins, it starts from a position of demonstrated continuous compliance with a complete evidence history. Not a cold start. Not a scramble. A continuation.
The Defined Approach is the traditional path to PCI-DSS compliance. The standard specifies exactly what must be implemented, how it must be configured, and what testing procedures the QSA will use to verify it. For Requirement 8.3.6, the Defined Approach states: passwords must be a minimum of 12 characters, or if the system does not support 12 characters, a minimum of 8 characters. The testing procedure instructs the QSA to examine system configuration settings and verify that the minimum password length is set accordingly. The evidence requirement is specific: show the configuration. The pass/fail criterion is binary: either the configuration meets the stated minimum or it does not. This prescriptive model works well for organizations with traditional architectures that align with the standard's assumptions. The requirements are clear, the testing procedures are predictable, and QSAs have years of experience evaluating evidence against these specific criteria. Most organizations will use the Defined Approach for the majority of their requirements.
The Customized Approach, introduced in v4.0, allows organizations to meet a requirement's security objective through alternative means. Each requirement in PCI-DSS v4.0 includes a stated Customized Approach Objective that describes the security outcome the requirement aims to achieve, separate from the prescriptive control that achieves it under the Defined Approach. For Requirement 8.3.6, the Customized Approach Objective states: "Passwords cannot be guessed through brute-force or offline attacks." An organization might satisfy this objective through passwordless authentication using cryptographic credentials, which eliminates passwords entirely rather than enforcing a minimum length. To use the Customized Approach, the organization must perform a targeted risk analysis documenting the specific threat (brute-force and offline password attacks), the alternative control (passwordless cryptographic authentication), and the rationale for why the alternative is at least as effective as the prescriptive requirement. The QSA then evaluates both the control and the risk analysis. The Customized Approach requires more documentation and deeper QSA engagement but enables organizations with modern architectures to demonstrate compliance without retrofitting prescriptive controls that do not align with their technology choices.
Rampart supports both approaches with distinct evidence models. For Defined Approach requirements, Rampart tracks the specific testing procedure criteria and maps evidence directly to the prescribed control: configuration snapshots, policy documents, scan results, and access review logs that satisfy the defined testing procedures. For Customized Approach requirements, Rampart provides a structured workspace for the targeted risk analysis: threat identification, alternative control description, effectiveness justification, and the mapping between the alternative control and the Customized Approach Objective. Artificer assists with both models. For the Defined Approach, Artificer generates narratives that describe how the organization's specific implementation satisfies each testing procedure. For the Customized Approach, Artificer helps structure the targeted risk analysis by identifying the relevant threats, evaluating the alternative control's coverage, and highlighting gaps in the justification that the QSA is likely to question. Organizations can mix approaches across requirements: Defined Approach for the majority, Customized Approach for specific requirements where their architecture justifies an alternative. Rampart tracks the approach selection per sub-requirement and ensures the evidence model matches the chosen path.
PCI-DSS requirements map to the broader NIST 800-53 control catalog through well-documented crosswalks. The PCI SSC publishes mapping guidance that traces each PCI-DSS requirement to corresponding NIST 800-53 controls. Requirement 1 (Network Security Controls) maps to NIST 800-53 controls SC-7 (Boundary Protection), AC-4 (Information Flow Enforcement), and CA-3 (System Interconnections). Requirement 3 (Protect Stored Account Data) maps to SC-28 (Protection of Information at Rest) and SC-12 (Cryptographic Key Establishment and Management). Requirement 8 (Identify Users and Authenticate Access) maps to IA-2 (Identification and Authentication), IA-5 (Authenticator Management), and AC-7 (Unsuccessful Logon Attempts). Requirement 10 (Log and Monitor All Access) maps to AU-2 (Event Logging), AU-3 (Content of Audit Records), AU-6 (Audit Record Review), and AU-11 (Audit Record Retention). These mappings are deterministic and auditable. Work done for PCI-DSS simultaneously satisfies controls in every framework that traces back to the same NIST 800-53 lineage. The investment in PCI-DSS compliance compounds across your entire compliance portfolio.
A concrete example demonstrates the cross-framework leverage. PCI-DSS Requirement 8.3.1 requires multi-factor authentication for all access to the CDE. This maps to NIST 800-53 control IA-2(1) (Multi-Factor Authentication to Privileged Accounts) and IA-2(2) (Multi-Factor Authentication to Non-Privileged Accounts). In SOC 2, the same underlying capability maps to CC6.1 (Logical and Physical Access Controls) under the Common Criteria. In ISO 27001:2022, it maps to A.8.5 (Secure Authentication). In NIST 800-171 rev2, it maps to requirement 3.5.3 (Use multifactor authentication for local and network access). In CMMC Level 2, it maps to IA.L2-3.5.3. One PCI-DSS requirement assessed. One set of defenses implemented. One evidence chain collected. Five frameworks advanced. Organizations that maintain PCI-DSS compliance have already satisfied a substantial percentage of the controls required for SOC 2 Type II, ISO 27001, and NIST-derived frameworks. The overlap is not approximate. It traces through published, auditable crosswalks maintained by the authoritative bodies for each framework.
Rampart maintains the cross-reference engine that resolves these derivation chains through five strategies: native control mapping (direct requirement-to-control relationships published by the framework authority), NIST 800-53 derivation chain tracing (following the path from any framework back through 800-53 to any other framework that derives from it), NIST CSF 2.0 bridging (using the Cybersecurity Framework's function/category/subcategory structure as an intermediary between frameworks that lack direct mappings), published crosswalks from authoritative sources (PCI SSC for PCI-DSS, AICPA for SOC 2, ISO for 27001, NIST for all NIST publications), and AI-suggested mappings that require human confirmation before activation. As you satisfy PCI-DSS requirements, Rampart computes your readiness percentage for every other framework in the catalog in the background. The computation resolves each individual control relationship through the derivation chain and accounts for framework-specific parameter differences. When you activate a new framework assessment, it arrives pre-populated from your existing PCI-DSS work. The marginal effort to add each subsequent framework decreases because the control overlap compounds through the derivation chain. One security posture. Every framework computed.
Something is being forged.
The full platform is under active development. Reach out to learn more or get early access.