PCI DSS Compliance Checklist: 12 Requirements for 2026

Last updated: February 24, 2026

Key Takeaways

  • PCI DSS 4.0 applies to cardiology clinics that process card payments such as RPM billing and patient copays. About 80% of breaches stem from payment vulnerabilities, and fines can exceed $100,000.
  • Key v4.0 changes for clinics include multi-factor authentication for all CDE access, 12-character passwords, authenticated vulnerability scanning, and real-time change detection.
  • The 12 PCI DSS requirements cover secure networks, data protection, vulnerability management, access controls, monitoring, and security policies, and they translate into practical audit checklists for clinics.
  • Most cardiology practices qualify as Level 4 merchants using SAQs. PCI DSS overlaps with HIPAA in access controls, encryption, logging, and training.
  • Clinics can follow five steps to comply: define CDE scope, perform a gap analysis, remediate issues, test controls, and maintain compliance. Schedule a demo with Rhythm360 to support HIPAA-compliant RPM and secure payment workflows.

Why PCI DSS Matters For Cardiology Payment Workflows

The Payment Card Industry Data Security Standard (PCI DSS) is a mandatory security framework for any organization that processes, stores, or transmits credit card information. PCI DSS categorizes merchants into four compliance levels based on annual transaction volume, and most small cardiology practices fall into Level 4, with fewer than 20,000 e-commerce transactions or up to 1 million total transactions each year.

Cardiology clinics must comply when they process patient copays, deductibles, or RPM billing payments. This includes secure handling of cardholder data during office visits, telehealth encounters, and remote monitoring services for CIED patients. The standard becomes especially critical for recurring payments in chronic disease monitoring programs, where clinics process hundreds of monthly transactions for heart failure and hypertension patients under CPT codes 99453-99458.

Non-compliance creates serious financial and reputational risk. Fines can range from $5,000 to $100,000 per month depending on breach severity and merchant level. Breaches can also damage patient trust and trigger investigations from payment card brands and healthcare regulators.

Seven PCI DSS 4.0 Changes Cardiology Clinics Need To Know

PCI DSS 4.0 was released in March 2022 and introduced updates that directly affect healthcare payment environments:

Change v3.2.1 v4.0 Impact
Multi-Factor Authentication Required for remote access only Required for ALL CDE access
Password Requirements Minimum 7 characters Minimum 12 characters
Network Security Controls Firewall-focused Broader network security controls
Vulnerability Scanning Basic scanning methods Authenticated scanning required
Script Management Limited requirements Full script inventory (Req 6.4.3)
Change Detection Periodic monitoring Real-time change detection (Req 11.6.1)
Risk Analysis Annual assessments Targeted quarterly risk analysis

Clinic-Friendly PCI DSS 4.0 Checklist: The 12 Requirements

PCI DSS v4.0.1 enforces 12 core requirements across six control objectives. Use this list as a practical audit guide for your clinic.

Securing Cardiology Networks That Handle Payments

Requirement 1: Install and Maintain Network Security Controls
• Firewalls remain active on all systems that process card data.
• Direct public access to the cardholder data environment stays blocked.
• Network security control configurations are documented and reviewed every six months.
• Mobile devices that access patient payment data have personal firewalls enabled.
• Roles and responsibilities for managing network controls are clearly assigned.

Requirement 2: Apply Secure Configurations to All System Components
• Default passwords are changed on all payment processing systems.
• Multi-factor authentication is enabled for all access to cardholder data environments.
• Passwords contain at least 12 characters and meet complexity rules.
• Unnecessary services and protocols are disabled on payment systems.
• EHR systems that process payments follow secure configuration baselines.

Protecting Cardholder Data In Transit And At Rest

Requirement 3: Protect Stored Account Data
• Cardholder data storage is limited to what the business truly needs.
• Primary account numbers (PANs) are masked when displayed.
• Sensitive authentication data such as CVV and PIN is never stored after authorization.
• Encryption keys are securely managed and rotated on a defined schedule.
• RPM billing systems encrypt stored payment data correctly.

Requirement 4: Protect Cardholder Data with Strong Cryptography During Transmission
• Strong encryption protects all card data transmitted over public networks.
• SSL or TLS certificates for payment pages remain valid and unexpired.
• An inventory exists for all cryptographic keys and certificates.
• Secure protocols are used for telehealth payment processing.
• Mobile RPM apps encrypt payment data during transmission.

Managing Vulnerabilities In Clinical Payment Systems

Requirement 5: Protect All Systems from Malicious Software
• Anti-malware software is installed on all systems that process card data.
• Malware definitions update automatically and on a regular schedule.
• Periodic malware scans run on payment processing workstations.
• Systems are protected against malware that could expose patient payment data.

Requirement 6: Develop and Maintain Secure Systems and Software
• Security patches are applied quickly to payment processing systems.
• A complete inventory exists for scripts on payment pages (Req 6.4.3).
• Custom payment applications follow secure coding practices.
• EHR integrations with payment processors follow secure development guidelines.
• Payment system changes are tested in isolated environments before deployment.

Controlling Who Can Access Cardholder Data

Requirement 7: Restrict Access to Cardholder Data by Business Need-to-Know
• Access to cardholder data is limited to staff who need it for their job.
• Role-based access controls are configured for payment systems.
• Device technicians have appropriate access levels for RPM billing functions.
• Access privileges are reviewed and updated whenever staff roles change.

Requirement 8: Identify and Authenticate Access to System Components
• Each user has a unique ID for accessing payment systems.
• Multi-factor authentication is required for all cardholder data environment access.
• User accounts lock after repeated failed login attempts.
• Shared or group accounts for payment processing are removed.
• Inactive user accounts are disabled promptly.

Monitoring Cardiology Payment Environments

Requirement 9: Restrict Physical Access to Cardholder Data
• Payment processing workstations sit in secure, monitored areas.
• Visitors to areas with payment systems require escorts.
• Payment terminals and card readers are physically secured.
• Media that contains cardholder data is stored securely and tracked.

Requirement 10: Log and Monitor All Access to Network Resources and Cardholder Data
• All access attempts to cardholder data are logged and monitored.
• Logs include user identification, event type, date and time, and success or failure.
• Log files are protected from unauthorized modification.
• Logs are reviewed daily for suspicious activity.

Requirement 11: Test Security of Systems and Networks Regularly
• Quarterly vulnerability scans use authenticated methods.
• Annual penetration testing is conducted by qualified assessors.
• Real-time change detection runs on payment pages (Req 11.6.1).
• Network segmentation tests occur every six months.
• Intrusion detection systems monitor cardholder data environments.

Building A Sustainable Security Program

Requirement 12: Support Information Security with Organizational Policies and Programs
• A comprehensive information security policy is documented and maintained.
• Staff receive annual training on PCI DSS requirements and security awareness.
• A formal incident response plan exists for payment data breaches.
• Security responsibilities are clearly defined for all personnel.
• Vendor agreements include PCI DSS compliance obligations.

Platforms like Rhythm360 provide HIPAA-compliant capabilities such as access controls and audit logging, which support the security needs of cardiology practices.

Rhythm360
Rhythm360

PCI DSS Levels And SAQs For Cardiology Clinics

PCI DSS categorizes merchants into four levels based on annual transaction volume, and those levels determine validation requirements.

Level Annual Transactions Validation Method Typical Clinic Example
Level 1 Over 6 million Annual RoC by QSA Large health systems
Level 2 1-6 million SAQ + quarterly ASV scans Multi-location cardiology groups
Level 3 20K-1M e-commerce SAQ + quarterly ASV scans Practices with online payment portals
Level 4 Under 20K e-commerce or up to 1M total SAQ + quarterly ASV scans Most solo/small cardiology practices

Most cardiology clinics fall into Level 4 and must complete the correct Self-Assessment Questionnaire and quarterly Approved Scanning Vendor scans. SAQ type depends on payment methods, such as SAQ A for practices that use third-party processors, SAQ B for dial-up terminals, or SAQ C for web-based payment applications.

How PCI DSS And HIPAA Overlap In Cardiology

Cardiology practices must meet PCI DSS and HIPAA requirements at the same time, and many controls support both frameworks.

Access Controls: Both standards require role-based access and user authentication.
Encryption: HIPAA Security Rule and PCI DSS both require encryption of sensitive data.
Audit Logging: Both require detailed logging and monitoring of data access.
Risk Assessments: Regular security assessments are required under both frameworks.
Incident Response: Breach notification requirements appear in both standards.
Vendor Management: Business Associate Agreements should reference PCI DSS compliance.
Physical Security: Both require physical safeguards for systems that process sensitive data.
Employee Training: Security awareness training is mandatory in both standards.
Mobile Device Security: RPM apps must satisfy both HIPAA and PCI DSS controls.
Network Segmentation: Payment and PHI systems should be isolated from general networks.

Schedule a demo with Rhythm360 to see how a single platform can support both PCI DSS and HIPAA requirements for cardiology workflows.

Five Practical Steps To PCI Compliance In Your Clinic

1. Scope Your Cardholder Data Environment (CDE): Identify every system, network, and workflow that stores, processes, or transmits card data, including EHR payment modules and RPM billing systems.

2. Conduct Gap Analysis: Use this checklist to compare your current security controls against PCI DSS 4.0 requirements, document gaps, and prioritize remediation work.

3. Remediate Security Gaps: Implement missing controls such as multi-factor authentication, strong encryption, and network segmentation.

4. Test and Validate: Run vulnerability scans, penetration tests, and security assessments to confirm that controls work and are configured correctly.

5. Maintain Ongoing Compliance: Set up continuous monitoring, recurring assessments, and regular staff training to keep compliance on track over time.

Common pitfalls include underestimating the scope of cardholder data environments and failing to maintain controls after initial certification. One cardiology practice received a $50,000 fine after a breach exposed payment data stored in an unencrypted database that connected to their EHR system.

Frequently Asked Questions

What are the 12 PCI DSS requirements?

The 12 PCI DSS requirements fall under six control objectives. Build and Maintain Secure Networks covers Requirements 1 and 2. Protect Cardholder Data covers Requirements 3 and 4. Maintain a Vulnerability Management Program covers Requirements 5 and 6. Implement Strong Access Control Measures covers Requirements 7 and 8. Regularly Monitor and Test Networks covers Requirements 9 through 11. Maintain Information Security Policy covers Requirement 12. Each requirement contains detailed sub-requirements that define specific security controls for protecting payment card data.

Where can I get a PCI DSS 4.0 checklist PDF for healthcare?

Generic PCI DSS checklists are available from the PCI Security Standards Council. Healthcare-specific templates that address HIPAA overlaps and clinical workflows are less common. Cardiology practices often need customized checklists that reflect RPM billing, EHR integrations, and medical device connectivity. Many clinics work with healthcare IT consultants or compliance platforms that provide industry-specific guidance and templates.

Is PCI DSS mandatory for cardiology clinics?

PCI DSS compliance is mandatory for any cardiology clinic that accepts, processes, stores, or transmits credit card payments, regardless of transaction volume. This includes practices that handle patient copays, deductibles, RPM billing, or any other card-based payments. Non-compliance can trigger fines, higher transaction fees, and even loss of card processing privileges.

Can small cardiology practices self-comply with PCI DSS?

Most small cardiology practices, classified as Level 4 merchants, can self-assess using the appropriate Self-Assessment Questionnaire instead of a formal audit. These practices must still implement all required security controls, complete quarterly vulnerability scans, and maintain ongoing compliance. Many small clinics choose compliant payment solutions or partner with experienced healthcare IT providers to support proper implementation.

What are PCI DSS compliance levels for healthcare practices?

Healthcare practices use the same four PCI DSS levels as other merchants, based on annual card transaction volume. Level 1, with over 6 million transactions, usually includes large health systems. Level 2, with 1 to 6 million transactions, covers multi-location groups. Level 3, with 20,000 to 1 million e-commerce transactions, includes practices with online portals. Level 4, with under 20,000 e-commerce transactions or up to 1 million total, includes most solo and small cardiology practices. Each level carries different validation requirements and costs.

Next Steps To Secure Cardiology Payments

This checklist gives cardiology clinics a clear starting point for PCI DSS 4.0 compliance, but lasting protection requires ongoing vigilance and the right technology stack. Schedule a demo with Rhythm360 to see how our HIPAA-compliant platform supports secure RPM billing and EHR integrations for cardiology practices.

Advisory Tags
Our automatic tagging and tracking keeps getting better - identify, manage and track multiple advisories more efficiently.
View and Acknowledge Recalls
Staff can document steps taken to resolve the recall for continuity of communication, tracking, and accountability.
Links Straight to FDA
Rhythm360 provides direct access to all the advisory details you need without additional searching and clicks.