[{"data":1,"prerenderedAt":80},["ShallowReactive",2],{"term-p\u002Fpci-dss":3,"related-p\u002Fpci-dss":60},{"id":4,"title":5,"acronym":5,"body":6,"category":39,"description":40,"difficulty":41,"extension":42,"letter":15,"meta":43,"navigation":44,"path":45,"related":46,"seo":53,"sitemap":54,"stem":57,"subcategory":58,"__hash__":59},"terms\u002Fterms\u002Fp\u002Fpci-dss.md","PCI DSS",{"type":7,"value":8,"toc":32},"minimark",[9,14,18,22,25,29],[10,11,13],"h2",{"id":12},"eli5-the-vibe-check","ELI5 — The Vibe Check",[15,16,17],"p",{},"PCI DSS is the security standard you must follow if you handle credit card data. It's the payment industry's strict rulebook — with requirements like encrypting card numbers, not storing the CVV, logging all access, and running regular security scans. Violating it means fines and potentially losing the ability to accept card payments.",[10,19,21],{"id":20},"real-talk","Real Talk",[15,23,24],{},"PCI DSS (Payment Card Industry Data Security Standard) is a set of security requirements for organizations that handle cardholder data. It includes 12 major requirements covering network security, encryption, access control, monitoring, and vulnerability management. Compliance is validated annually by Qualified Security Assessors (QSAs).",[10,26,28],{"id":27},"when-youll-hear-this","When You'll Hear This",[15,30,31],{},"\"We're using Stripe to avoid PCI DSS scope — they handle card data.\" \u002F \"PCI DSS requires quarterly external vulnerability scans.\"",{"title":33,"searchDepth":34,"depth":34,"links":35},"",2,[36,37,38],{"id":12,"depth":34,"text":13},{"id":20,"depth":34,"text":21},{"id":27,"depth":34,"text":28},"security","PCI DSS is the security standard you must follow if you handle credit card data.","intermediate","md",{},true,"\u002Fterms\u002Fp\u002Fpci-dss",[47,48,49,50,51,52],"Compliance","GDPR","SOC 2","Encryption","Security Audit","Vulnerability",{"title":5,"description":40},{"changefreq":55,"priority":56},"weekly",0.7,"terms\u002Fp\u002Fpci-dss",null,"429lwjZh6al4J-E4QCI_KxFWJmcimAjAZDyX-eFFHKw",[61,65,68,71,74,77],{"title":47,"path":62,"acronym":58,"category":39,"difficulty":63,"description":64},"\u002Fterms\u002Fc\u002Fcompliance","beginner","Compliance means following the rules — legal, industry, or governmental standards that say how you must handle data and security.",{"title":50,"path":66,"acronym":58,"category":39,"difficulty":63,"description":67},"\u002Fterms\u002Fe\u002Fencryption","Encryption is scrambling your message into gibberish so only someone with the secret decoder ring can read it.",{"title":48,"path":69,"acronym":48,"category":39,"difficulty":63,"description":70},"\u002Fterms\u002Fg\u002Fgdpr","GDPR (General Data Protection Regulation) is the EU's big rulebook for protecting people's personal data.",{"title":51,"path":72,"acronym":58,"category":39,"difficulty":63,"description":73},"\u002Fterms\u002Fs\u002Fsecurity-audit","A security audit is a systematic review of your code, infrastructure, and processes to find security weaknesses.",{"title":49,"path":75,"acronym":49,"category":39,"difficulty":41,"description":76},"\u002Fterms\u002Fs\u002Fsoc-2","SOC 2 is a trust certification for SaaS companies. It proves to enterprise customers that you take security, availability, and privacy seriously.",{"title":52,"path":78,"acronym":58,"category":39,"difficulty":63,"description":79},"\u002Fterms\u002Fv\u002Fvulnerability","A vulnerability is a weakness in your code or system that a bad guy could exploit. Like a broken lock on a door.",1776518300067]