| Data Category |
Data Elements |
PCI Classification |
Storage Allowed? |
Protection Requirements |
| Sensitive Authentication Data (SAD) |
CVV / CVC / CID, PIN, PIN Block, Full Track Data |
SAD |
No |
Must never be stored post-authorization; secure handling during processing only |
| Cardholder Core Data |
Primary Account Number (PAN) |
CHD |
Yes (strictly controlled) |
Encryption (at rest & in transit), masking, strong access control, logging |
| Supporting Cardholder Data |
Cardholder Name, Expiry Date, Service Code |
CHD |
Yes |
Access control, data minimization, avoid unnecessary storage |
| Derived / Protected Data |
Masked PAN, Tokenized PAN (irreversible) |
Derived |
Yes |
Masking standards, tokenization controls, secure mapping (if applicable) |
| Operational / System Data |
Logs (masked), Audit Trails, Session Data |
Contextual |
Yes (controlled) |
Masking, encryption, integrity protection, restricted access |
| Cryptographic Material |
Encryption Keys, Key Encryption Keys (KEK) |
PCI Key Management |
Yes (highly restricted) |
HSM/KMS storage, key rotation, dual control, strict access governance |
| Role Category |
Role / Entity |
Internal / External |
Primary Responsibilities |
Relevant PCI Areas |
| Executive Governance |
|
CISO / Security Head |
Internal |
Overall PCI accountability, security strategy, risk acceptance |
Req. 12 |
|
CIO / CTO |
Internal |
Technology alignment, funding, architecture oversight |
Req. 12 |
|
Compliance / Risk Head |
Internal |
Regulatory alignment, audit coordination, risk management |
Req. 12 |
| PCI Program Leadership |
|
PCI Program Manager |
Internal |
Drive PCI program, coordinate teams, track compliance |
Req. 12 |
|
PCI Governance Committee |
Internal |
Decision-making, exception approvals, prioritization |
Req. 12 |
| Architecture & Engineering |
|
Enterprise / Solution Architects |
Internal |
Design PCI-compliant architecture (CDE, segmentation, controls) |
Req. 1, 2, 3 |
|
Application Development Teams |
Internal |
Secure coding, vulnerability remediation |
Req. 6 |
|
DevOps / Platform Engineering |
Internal |
CI/CD security, infrastructure hardening |
Req. 2, 6 |
| Security Operations |
|
SOC (Security Operations Center) |
Internal |
Monitoring, alerting, incident response |
Req. 10, 11, 12 |
|
IAM Team |
Internal |
User access control, authentication, RBAC |
Req. 7, 8 |
|
Network Security Team |
Internal |
Firewall, segmentation, traffic control |
Req. 1 |
|
Data Security Team |
Internal |
Encryption, key management, tokenization |
Req. 3 |
| Audit & Compliance |
|
Internal Audit Team |
Internal |
Continuous compliance checks |
Req. 11, 12 |
|
QSA (Qualified Security Assessor) |
External |
Formal PCI certification |
All |
|
ASV (Approved Scanning Vendor) |
External |
External vulnerability scans |
Req. 11 |
| Vendors & Third Parties |
|
Payment Processors / Gateways |
External |
Secure transaction processing |
Req. 12 |
|
Third-party Service Providers |
External |
Compliance for outsourced services |
Req. 12 |
|
Cloud Providers |
External |
Shared responsibility model |
Req. 1–12 |