Skip to main content

On-demand webinar coming soon...

Blog

What is a PCI DSS Self-Assessment Questionnaire?

Self-assessment questionnaires help evaluate and prove PCI DSS compliance. Find out which SAQ is right for your organization

Katrina Dalao
Sr. Content Marketing Specialist, CIPM
June 15, 2023

Two female lawyers converse on a courthouse's front steps.

If your organization deals with any type of cardholder data, then you’ve most likely heard of Self-Assessment Questionnaires. 

A Self-Assessment Questionnaire (SAQ) is a formal report of an organization’s compliance with the Payment Card Industry Data Security Standard (PCI DSS). It evaluates whether a merchant or service provider has taken the necessary measures to secure cardholder data and documents its overall security posture.  

The process of completing an SAQ is different for every organization. Even before the assessment starts, there are nine different types of SAQs to choose from, depending on your specific process payment method and cardholder environment. 

Below, we cover each SAQ type, what each one entails, and how to identify the most applicable SAQ for your environment. 

 

What is a PCI DSS Self-Assessment Questionnaire?

The Payment Card Industry Data Security Standard (PCI DSS) Self-Assessment Questionnaire (SAQ) is a validation tool designed to help merchants and service providers evaluate and report their PCI DSS compliance. 

Each SAQ starts with a “Before you Begin” section that outlines the type of cardholder environment covered by the specific questionnaire. This is followed by a series of “yes” or ”no” questions about all aspects of an organization's payment card processing activities and security controls, encompassing network security, system configuration, access control, and the like.

SAQs also include an Attestation of Compliance (AOC), which serves as a formal declaration of the organization’s compliance with PCI DSS requirements. 

In summary, the entire SAQ includes three sections: 

  • Section 1: Assessment Information and Executive Summary (Part 1 and 2 of the Attestation of Compliance)
  • Section 2: PCI DSS Self-Assessment Questionnaire 
  • Section 3: Validation and Attestation Details and Action Plan for Non-Compliant Requirements (if applicable) (Parts 3 & 4 of the AOC)

SAQs are available in an online format or as a downloadable PDF.

 

Who needs to complete a PCI DSS Self-Assessment Questionnaire?

Not every organization is eligible for self-assessment. Only merchants and service providers with lower transaction volumes — less than 6 million annual payment card transactions for merchants, and less than 300,000 annual payment card transactions for service providers — can submit an SAQ to demonstrate PCI DSS compliance. 

Organizations with a higher number of annual transactions are required to submit a more in-depth Report on Compliance (ROC). 

Read more about the different Merchant and Service Provider Levels as outlined by PCI DSS. 

For more information, organizations should also consult with their acquiring bank or payment brand to determine whether they are eligible to submit an SAQ and which SAQ is appropriate for their cardholder environment.

 

Which PCI SAQ is right for your business

There are nine types of PCI DSS SAQs — eight for merchants and one for service providers.* Determining which one is most appropriate for your organization depends on two factors: Whether you’re a merchant or service provider, and how you process card payments. 

See the following explanations to determine which SAQ type is best for your organization: 

 

SAQ A

Card-not-present merchants (ecommerce or mail/telephone order) that have fully outsourced all cardholder data functions to PCI DSS compliant third-party service providers, with no electronic storage, processing, or transmission of any cardholder data on the merchant’s systems or premises. Not applicable to face-to-face channels. 

 

SAQ A-EP

Ecommerce merchants who outsource all payment processing to PCI DSS validated third parties and who have a website that doesn’t directly receive cardholder data but that can impact the security of the payment transaction. No electronic storage, processing or transmission of cardholder data on merchant’s systems or premises. Applicable only to ecommerce channels. 

 

SAQ B 

Merchants using only: Imprint machines with no electronic cardholder data storage and/or standalone dial-out terminals with no electronic cardholder data storage. Not applicable to ecommerce channels. 

 

SAQ B-IP 

Merchants using only standalone, PTS-approved payment terminals with an IP connection to the payment processor with no electronic cardholder data storage. Not applicable to ecommerce channels. 

 

SAQ C-VT

Merchants who manually enter a single transaction at a time via a keyboard into an Internet-based, virtual payment terminal solution that is provided and hosted by a PCI DSS validated third-party service provider. No electronic cardholder data storage. Not applicable to ecommerce channels.

 

SAQ C 

Merchants with payment application systems connected to the Internet, no electronic cardholder data storage. Not applicable to ecommerce channels. 

 

SAQ P2PE-HW

Merchants using only hardware payment terminals included in and managed via a validated, PCI SSC-listed P2PE (point-to-point encryption) solution, with no electronic cardholder data storage. Not applicable to ecommerce merchants.  

 

SAQ D

SAQ D for Merchants: All merchants who are not included in descriptions for the above SAQ types. 

SAQ D for Service Providers: All service providers defined by a payment brand as eligible to complete an SAQ. 

* This information is sourced directly from pcisecuritystandards.org

 

Flow chart depicting which SAQ best apply to environment

Download the full pdf

 

How to submit your PCI DSS SAQ?

SAQs are typically submitted to your organization's acquiring bank or payment card brand. It’s best to confirm whether they have specific instructions on how to submit your SAQ or any additional documentation or evidence.

Once the SAQ has been filled out and all supporting documentation has been collected (such as AOC), submit everything to your acquiring bank or payment card brand and await any next steps. Submission is typically done by uploading the documents through an online portal or using a secure file transfer method.

If your SAQ is deemed compliant, you will receive confirmation of your PCI DSS compliance. If there are any issues or areas of non-compliance, you will need to address these with additional clarification or information if necessary. 

 

How OneTrust helps with PCI DSS compliance.

If you need more information on how to select the appropriate PCI DSS SAQ for your organization, OneTrust is here to help. Our Certification Automation solution helps determine your compliance scope, identify any security gaps, and fill out the required SAQs. 

With OneTrust Certification Automation, you can build, scale, and automate your security compliance program, reduce your cost of compliance up to 60%, and obtain certifications 50% faster.  


You may also like

Webinar

Ethics Program Management

EthicsConnect: Risk - It’s not just for breakfast anymore

Join us for a deep dive into embedding privacy by design into the fabric of your business to promote the responsible use of data.

April 25, 2024

Learn more

Infographic

Technology Risk & Compliance

Rethinking risk assessments: Bridging the gap between best practices and action

Download our infographic to learn the main challenges faced during risk assessments, proven frameworks for assessing risks, and how to translate guidance into action.

March 07, 2024

Learn more

Webinar

Technology Risk & Compliance

PCI DSS Compliance: How to scope and streamline monitoring with Certification Automation

Join our PCI DSS webinar where we discuss how Certification Automation can help free up valuable InfoSec resources, streamline audits, and stay continuously compliant.

March 05, 2024

Learn more

eBook

Ethics Program Management

Business messaging apps: A guide to corporate compliance

How can your business use third-party messaging apps while staying compliant? Dive into key usage considerations based on the DOJ’s 2023 guidance.

February 13, 2024

Learn more

Webinar

Technology Risk & Compliance

5 automation trends to modernize InfoSec compliance

Join our webinar for insights on transforming InfoSec program management. Navigate the complexities of modern security with a flexible, scalable, and cost-effective approach.

February 07, 2024

Learn more

Infographic

Third-Party Risk

4 top-of-mind challenges for CISOs in 2024

What key challenges do CISOs face going into the new year? Download this infographic to hear what experts from industries across the board have to say.

January 30, 2024

Learn more

eBook

Technology Risk & Compliance

NIST Cybersecurity Framework 2.0: Changes, impacts, and opportunities for your InfoSec program

Get your free guide to the NIST Cybersecurity Framework 2.0 and learn how its proposed changes will impact your InfoSec programs.

December 18, 2023

Learn more

Resource Kit

Technology Risk & Compliance

NIST CSF essentials: Empowering cybersecurity excellence

Download our NIST CSF Essentials resource kit and master cybersecurity compliance with expert insights, strategies, and real-world case studies.

December 15, 2023

Learn more

Webinar

Technology Risk & Compliance

Demonstrating GDPR compliance with Europrivacy criteria: The European Data Protection Seal

Join our webinar to learn more about the European Data Protection Seal and to find out what the key advantages of getting certified.

November 30, 2023

Learn more

Checklist

Technology Risk & Compliance

SOC 2 checklist: 8 steps to achieve compliance

This SOC 2 checklist provides clear action steps that enable you to mature your security program and fast-track your way to compliance.

November 28, 2023

Learn more

Data Sheet

Technology Risk & Compliance

Integrations to automate your framework compliance: ISO 27001, SOC 2, and NIST CSF

Explore how OneTrust integrations can help you automate compliance with today’s most popular InfoSec frameworks.

November 28, 2023

Learn more

Webinar

Ethics Program Management

Ethics Exchange: Risk assessments

Join our risk assessments experts as we discuss best practices, program templates, and how provide an assessment that provides the best value for your organization.

October 25, 2023

Learn more

Infographic

Technology Risk & Compliance

Understanding Europe's Top InfoSec and Cybersec Frameworks

Learn the ins and outs of Europe’s top InfoSec and cybersec frameworks, including ISO 27001, UK Cyber Essentials, the NIS2 Directive, DORA, and more.

October 05, 2023

Learn more

Infographic

Technology Risk & Compliance

5 key areas for improved automation in InfoSec compliance

Streamline and scale your organization’s InfoSec compliance program by focusing on these five key areas of automation

October 02, 2023

Learn more

eBook

Technology Risk & Compliance

Prioritizing the right InfoSec frameworks for your organization

In this free eBook, we explore the basics of three top InfoSec frameworks and how to decide which is the best fit for your organization.

September 27, 2023

Learn more

Webinar

Third-Party Risk

Live Demo EMEA: How OneTrust can help advance your third-party risk management program

Join us for a live demo of OneTrust's third-party risk management solution and see how it can help automate and streamline your TPRM program.

September 19, 2023

Learn more

eBook

Privacy Management

Responsible data use: Navigating privacy in the information lifecycle eBook

Download this eBook and get the insights you need to safeguard customer privacy and ensure responsible data use in the information lifecycle.

August 22, 2023

Learn more

Webinar

Technology Risk & Compliance

How to successfully implement ISO 27001 to demonstrate security and assurance across any jurisdiction

Join our live webinar and hear from security professionals on how to get ISO 27001 certified, streamline audit preparation, and demonstrate security assurance across any regulatory jurisdiction.

June 28, 2023

Learn more

eBook

Third-Party Risk

InfoSec's guide to third-party risk management: Key considerations and best practices

Download our eBook to learn practical advice on how to approach third-party risk management like an InfoSec expert.

June 05, 2023

Learn more

Webinar

GRC & Security Assurance

Combating InfoSec compliance fatigue: Insights for navigating growingly complex requirements

In this webinar, you will hear first-hand from information security experts experts what are the key pain-points and their strategies to be audit ready. 

February 27, 2023

Learn more

Webinar

Technology Risk & Compliance

Introducing OneTrust Certification Automation: Build, scale, and automate your InfoSec compliance program webinar

In this webinar, learn how to right-size your compliance scope for different frameworks across various business dimensions and enable an agile audit process.

February 15, 2023

Learn more

Webinar

GRC & Security Assurance

Introducing OneTrust Certification Automation: Reinforce privacy accountability with automated InfoSec compliance

Learn how to enable an agile audit process by breaking down complex InfoSec requirements into actionable tasks to help automate your compliance program.

February 10, 2023

Learn more

eBook

Technology Risk & Compliance

The future of information security

Learn how to respond to the security landscape and build a proactive InfoSec program to help your customers and business.

October 10, 2022

Learn more

eBook

Technology Risk & Compliance

The art of the enterprise IT risk assessment

Ensure your enterprise IT risk assessment is a success with a top-down approach that gets executive buy-in from the start

September 16, 2022

Learn more

eBook

Technology Risk & Compliance

The enterprise DevSecOps playbook

As a unified business function, DevSecOps combines rapid software development with top-notch security at scale.

September 02, 2022

Learn more

Webinar

GRC & Security Assurance

How to reinforce your InfoSec risk program in a “Not If, But When” incident environment webinar

Learn how scaling your approach to managing IT assets & risk assessments can deliver a complete picture to better measure and inform program investments.

August 16, 2022

Learn more

Webinar

GRC & Security Assurance

5 critical mistakes to avoid when answering security questionnaires

Avoid these 5 critical mistakes when answering security questionnaires and streamline responses with this webinar.

March 01, 2022

Learn more

Webinar

GRC & Security Assurance

How successful security teams manage risk to build Trust and drive Growth

Watch this webinar to learn what makes a successful risk management program and how effective security teams build trust.

January 12, 2022

Learn more

Webinar

Privacy Management

Build an incident management playbook

Prepare for privacy and security incidents by building an incident management playbook.

August 27, 2021

Learn more

Fundamental to Comprehensive: Where Does Your Compliance Program Stand? Infographic | Resources | OneTrust

Learn more