ONLINE
THREATS: 4
1
0
0
0
0
0
0
1
1
0
0
1
0
1
1
1
1
0
1
1
1
1
1
0
0
1
1
1
0
1
1
0
0
1
1
0
1
0
1
1
0
0
1
0
0
1
0
0
0
1
PCI-DSS

PCI DSS SAQ Selection Guide: Choosing the Right Questionnaire

Loading advertisement...
69

I still remember the panic in the voice of the e-commerce director who called me in 2017. "We just completed our SAQ A-EP," she said, "and our acquiring bank rejected it. They say we should have filed SAQ D. We spent three months on the wrong questionnaire!"

That mistake cost her company an additional four months of work, $85,000 in consulting fees, and nearly derailed a critical product launch. All because they chose the wrong Self-Assessment Questionnaire (SAQ).

After fifteen years of helping merchants navigate PCI DSS compliance, I've seen this scenario play out dozens of times. Choosing the wrong SAQ isn't just inconvenient—it can invalidate months of work, delay business initiatives, and leave you exposed to both security risks and compliance violations.

Here's the good news: with the right guidance, selecting the appropriate SAQ is straightforward. Let me walk you through everything I've learned about making this critical decision correctly the first time.

What Exactly Is a PCI DSS SAQ? (And Why It Matters More Than You Think)

Before we dive into selection criteria, let's get crystal clear on what we're dealing with.

A Self-Assessment Questionnaire (SAQ) is PCI DSS's way of acknowledging that not every merchant processes payments the same way. A small online retailer using a payment redirect shouldn't have to validate the same 300+ requirements as a major payment processor running their own card processing infrastructure.

Think of SAQs as different difficulty levels in a video game. They all aim for the same goal—protecting cardholder data—but they scale the requirements based on how you actually handle payment cards.

"Choosing the right SAQ isn't about finding the easiest path. It's about honestly assessing your payment environment and selecting the questionnaire that actually matches your reality."

I learned this lesson the hard way early in my career. I helped a small restaurant chain complete SAQ C-VT (the shortest questionnaire) because they used standalone, dial-out terminals. Except during my validation visit, I discovered their POS system was actually connected to their network for inventory management. That seemingly small detail bumped them to SAQ D, requiring validation of 300+ controls instead of 30.

We had to start over. The owner wasn't happy, and I learned to ask more detailed questions upfront.

The Complete SAQ Landscape: All 9 Types Explained

As of PCI DSS version 4.0, there are nine different SAQ types. Yes, nine. Each designed for specific merchant environments and payment processing methods.

Let me break them down in a way that actually makes sense:

Overview of All SAQ Types

SAQ Type

Merchant Environment

Number of Requirements

Typical Use Case

Difficulty Level

A

Card-not-present, fully outsourced

22

E-commerce with payment redirect

⭐ Easiest

A-EP

E-commerce with outsourced processing

178

E-commerce with hosted payment page

⭐⭐⭐ Moderate

B

Imprint machines or standalone terminals

45

Small retail with standalone terminals

⭐⭐ Easy

B-IP

Standalone IP-connected terminals

82

Retail with IP-based terminals

⭐⭐⭐ Moderate

C-VT

Virtual terminal only

30

Mail/phone order with manual entry

⭐⭐ Easy

C

Payment application connected systems

160

Integrated POS systems

⭐⭐⭐⭐ Complex

P2PE-HW

Hardware-based P2PE solutions

35

Retail with validated P2PE

⭐⭐ Easy

D Merchant

All other merchants

300+

Complex environments

⭐⭐⭐⭐⭐ Most Complex

D Service Provider

Service providers storing, processing, or transmitting cardholder data

300+

Payment processors, gateways

⭐⭐⭐⭐⭐ Most Complex

The Critical Question: Which One Applies to You?

Here's where it gets interesting. Many merchants assume they can choose the shortest SAQ that seems to fit. That's not how it works.

You don't get to choose your SAQ based on convenience. Your payment environment chooses it for you.

I once worked with a subscription box company that desperately wanted to use SAQ A. Their payment flow redirected customers to Stripe, so it seemed perfect. Except they also stored customer payment tokens in their own database for recurring billing.

That one detail—storing tokens—meant they couldn't use SAQ A. They needed SAQ D. The difference? 22 requirements versus 300+.

"Your SAQ isn't determined by what you want to do. It's determined by what you actually do with cardholder data."

SAQ A: The Golden Standard (If You Qualify)

Let me start with the most desirable option: SAQ A. With only 22 requirements, it's the shortest and simplest questionnaire available.

Who Qualifies for SAQ A?

You can use SAQ A if—and only if—ALL of these conditions are true:

  • ✅ You accept only card-not-present transactions (e-commerce or phone/mail order)

  • ✅ All payment processing is completely outsourced to PCI DSS validated third-party service providers

  • ✅ You don't electronically store, process, or transmit any cardholder data on your systems

  • ✅ Your payment page completely redirects customers to a third-party site (you never see the card data)

  • ✅ You don't have any systems or network components in the payment flow

Real-World SAQ A Scenarios

Perfect SAQ A candidate: An online course provider using Stripe Checkout. Customers click "Buy Now," get redirected to Stripe's hosted payment page, complete purchase, then return to the merchant's site. The merchant's systems never touch card data. ✅

Not SAQ A: The same course provider, but they embedded Stripe Elements on their checkout page. Even though Stripe handles the data, it flows through their web page. ❌ (This would be SAQ A-EP)

The SAQ A Trap I See Constantly

Here's a mistake I've seen at least twenty times: merchants think that using a payment gateway automatically qualifies them for SAQ A.

I worked with a fitness studio in 2020 that proudly told me they were "SAQ A compliant" because they used Authorize.net. During my review, I discovered their membership software posted card data to Authorize.net via API from their own server.

That API integration meant cardholder data traversed their network, disqualifying them from SAQ A. They needed SAQ D.

The difference in compliance effort? Massive. We're talking 22 requirements versus 300+, and the associated costs jumped from about $3,000 annually to over $25,000.

SAQ A Requirements Breakdown

Requirement Category

Key Controls

Why It Matters

Network Security

Maintain firewall configuration

Protects your network even though card data doesn't flow through it

Security Policies

Document and maintain security policies

Creates accountability and structure

Vendor Management

Maintain list of service providers

Ensures your payment partners are compliant

Incident Response

Have a plan for security incidents

Prepares you for when things go wrong

Even with only 22 requirements, SAQ A isn't a checkbox exercise. I've seen merchants fail SAQ A audits because they couldn't demonstrate they were actually eligible or because they ignored basic security hygiene.

SAQ A-EP: The E-Commerce Sweet Spot (With Caveats)

SAQ A-EP (EP stands for "E-commerce Partial") is what most modern e-commerce sites end up using. It's significantly more complex than SAQ A—178 requirements instead of 22—but still more manageable than full SAQ D.

Who Qualifies for SAQ A-EP?

You're eligible for SAQ A-EP if:

  • ✅ Your website hosts payment pages but doesn't store card data

  • ✅ You use a PCI DSS validated payment service provider

  • ✅ Payment data flows through your web environment but is submitted directly to the third party

  • ✅ You don't electronically store cardholder data after authorization

  • ✅ Your website doesn't receive card data from other channels

SAQ A-EP: The Technical Reality

This is where we need to get technical. SAQ A-EP applies when you embed payment fields on your website using iframe, JavaScript, or similar technologies.

Common examples:

  • Stripe Elements: Payment fields embedded in your checkout page ✅

  • Braintree Drop-in UI: Payment form integrated into your site ✅

  • Square Payment Form: Card entry fields on your webpage ✅

  • PayPal Advanced: Hosted fields in your checkout flow ✅

The key distinction: the card data goes directly from the customer's browser to the payment provider, but it passes through your web environment to get there.

The SAQ A-EP Trap

I consulted with a subscription software company in 2021 that used Stripe Elements and was certain they qualified for SAQ A-EP. They were mostly right—except for one detail.

They had a "save payment method for faster checkout" feature that stored Stripe tokens in their database. Not the actual card numbers—just the tokens Stripe provided for future charges.

That token storage—even though it was just a reference pointer—required them to validate additional security controls. They needed to segment their database, implement encryption, restrict access, and monitor activity. It added about 60 additional control validations to their compliance scope.

My point: even within SAQ A-EP, small implementation details matter enormously.

SAQ A-EP Requirements Overview

Requirement Area

Control Count

Key Focus Areas

Network Security

40

Firewalls, network segmentation, wireless security

Access Control

35

User authentication, authorization, logging

Application Security

28

Secure coding, vulnerability management

Data Protection

25

Encryption, key management, data retention

Monitoring

20

Log review, file integrity monitoring

Security Testing

15

Vulnerability scans, penetration testing

Security Policies

15

Documentation, training, incident response

Total: 178 requirements

SAQ B: For Simple Retail Operations

SAQ B is designed for brick-and-mortar merchants with the simplest payment acceptance methods: imprint machines or standalone dial-out terminals.

Who Qualifies for SAQ B?

  • ✅ You use only imprint machines OR standalone dial-out terminals

  • ✅ Terminals are not connected to any other systems

  • ✅ You don't store cardholder data electronically

  • ✅ Terminals dial directly to the processor (not through your network)

The Harsh Reality of SAQ B in 2024

Here's something nobody tells you: SAQ B is becoming increasingly rare and impractical.

I haven't seen a merchant qualify for SAQ B in over three years. Why? Because modern payment terminals almost always connect via IP networks (internet or local network), which immediately disqualifies them from SAQ B.

Even terminals that technically could dial out are usually configured for IP connectivity because it's faster and more reliable.

If you think you qualify for SAQ B, I'd encourage you to double-check your terminals. If they connect to your network at all—even just for updates or maintenance—you likely need SAQ B-IP instead.

"In 2024, SAQ B is like a rotary phone—technically still functional, but you'd be hard-pressed to find one in actual use."

SAQ B-IP: Modern Retail's Default Choice

SAQ B-IP is where most small to medium retail operations land. It covers standalone terminals that connect via IP (internet protocol) rather than traditional phone lines.

Who Qualifies for SAQ B-IP?

  • ✅ You use standalone payment terminals with IP connectivity

  • ✅ Terminals connect to the internet but not to other systems on your network

  • ✅ You don't store cardholder data electronically

  • ✅ Terminals are not connected to your POS or other systems

The SAQ B-IP Network Isolation Requirement

This is crucial: for SAQ B-IP, your terminals must be isolated from your other systems.

I worked with a coffee shop chain in 2019 that used Square terminals. Perfect for SAQ B-IP, right? Except they connected their terminals to the same Wi-Fi network as their employee tablets and security cameras.

That shared network connection meant their payment terminals weren't truly isolated. They needed to either:

  1. Set up a separate, isolated network for payment terminals (what they chose), or

  2. Move to SAQ C or D to account for the network interconnection

They chose option 1, implementing a separate VLAN for payment terminals. Cost: about $2,800. Alternative cost of moving to SAQ D: over $20,000 annually.

SAQ B-IP Requirements

Requirement Category

Key Controls

Common Challenges

Terminal Security

Physical security, tamper-evident seals

Ensuring terminals aren't moved or accessed improperly

Network Isolation

Separate network for terminals

Most merchants initially fail this requirement

Vendor Management

Maintain list of service providers

Documenting all payment-related vendors

Wireless Security

Secure wireless configurations

Properly configuring separate wireless networks

Security Policies

Incident response, training

Creating documentation for small retail operations

Total: 82 requirements

SAQ C-VT: For Phone/Mail Order Businesses

SAQ C-VT (VT stands for "Virtual Terminal") is designed for merchants who manually key in payment information through a web-based virtual terminal.

Who Qualifies for SAQ C-VT?

  • ✅ You accept only phone or mail orders (card-not-present transactions)

  • ✅ You manually enter payment data into a virtual terminal

  • ✅ Virtual terminal is provided by PCI DSS validated third party

  • ✅ You don't store cardholder data electronically

  • ✅ You don't use e-commerce or have a website that accepts payments

Real-World SAQ C-VT Scenario

I worked with a call center for a catalog company that took phone orders. Operators would speak with customers, collect payment information, and type it into Authorize.net's virtual terminal.

Perfect SAQ C-VT candidate—until I discovered they recorded calls for quality assurance. Those recordings included customers reading their card numbers aloud.

Recorded audio of cardholder data = stored cardholder data = SAQ C-VT disqualification.

We had to either:

  1. Stop recording during payment collection (what they chose), or

  2. Implement controls for protecting stored audio (moving them to SAQ D)

The Workstation Security Challenge

SAQ C-VT has only 30 requirements, but don't let that fool you. The workstation security requirements can be challenging for small operations.

You need:

  • ✅ Anti-virus/anti-malware on all workstations

  • ✅ Firewalls protecting workstations

  • ✅ Secure configurations (removing unnecessary software, services)

  • ✅ Access restrictions (unique IDs for each user)

  • ✅ Physical security for workstations

I've seen home-based businesses struggle with these requirements because they use personal computers for both business and personal use. You can't use your kids' gaming computer to process payments and claim PCI compliance.

SAQ C: For Integrated POS Systems

SAQ C is for merchants with payment applications connected to their business systems—think modern retail POS systems.

Who Qualifies for SAQ C?

  • ✅ You have payment applications connected to the internet

  • ✅ Applications connect to payment processor, but don't store cardholder data

  • ✅ Payment applications are on systems that also run other business applications

  • ✅ You don't store cardholder data after authorization

The SAQ C Reality Check

Here's what most merchants don't realize: if your POS system is networked and processes payments, you're probably in SAQ C or D territory.

I consulted with a restaurant group using Toast POS. Their initial assumption: "We use a cloud-based POS, so we're SAQ A."

Actual reality: SAQ C, because:

  • Payment terminals connected to their network

  • POS system communicated with back-office systems

  • Network also connected to guest Wi-Fi, security cameras, and music systems

SAQ C Requirements Breakdown

Requirement Domain

Requirements

Implementation Complexity

Network Security

35

Network segmentation is challenging

System Hardening

25

Securing POS workstations and servers

Access Management

30

Unique user IDs, password policies

Application Security

20

Securing payment applications

Vulnerability Management

20

Quarterly scanning, patching

Monitoring

15

Log collection and review

Security Policies

15

Documentation and training

Total: 160 requirements

The jump from SAQ B-IP (82 requirements) to SAQ C (160 requirements) is significant. I typically see compliance costs double when merchants move from B-IP to C.

SAQ P2PE-HW: The Elegant Solution (When It Works)

SAQ P2PE-HW is for merchants using validated Point-to-Point Encryption (P2PE) hardware solutions. It's an elegant middle ground—only 35 requirements—but with strict eligibility requirements.

Who Qualifies for SAQ P2PE-HW?

  • ✅ You use only hardware payment terminals included in a PCI-validated P2PE solution

  • ✅ P2PE solution is listed on PCI SSC website as validated

  • ✅ You don't store, process, or transmit cardholder data

  • ✅ Payment terminals encrypt data at point of interaction

  • ✅ You don't have any systems that could affect P2PE solution

The P2PE Validation Requirement

This is non-negotiable: your P2PE solution must be listed on the PCI Security Standards Council's website as a validated P2PE solution.

I can't count how many merchants have told me, "Our processor says they use encryption, so we can use the P2PE SAQ."

No. Encryption ≠ validated P2PE.

For SAQ P2PE-HW eligibility, your solution must appear in the official P2PE solutions list at pcisecuritystandards.org. If it's not listed, you can't use this SAQ, regardless of what your processor claims about their encryption.

Real P2PE Success Story

I worked with a medical practice in 2022 that needed to accept patient payments. Their challenge: limited IT resources and budget.

They implemented a validated P2PE solution from Bluefin. By using P2PE-validated terminals and ensuring no cardholder data touched their systems, they qualified for SAQ P2PE-HW.

Result:

  • Only 35 requirements to validate

  • Annual compliance cost: under $5,000

  • Dramatically reduced breach risk

  • Simplified merchant operations

Compare that to SAQ D (which they would have needed with traditional terminals), which would have cost them over $30,000 annually.

P2PE Limitations to Understand

P2PE isn't a silver bullet. Limitations include:

Limitation

Impact

Workaround

Solution must be PCI-validated

Can't use with all processors

Choose processor with validated P2PE

Hardware-specific

Can't use with software or mobile solutions

Consider P2PE software solutions (different SAQ)

No e-commerce

Only works for face-to-face transactions

Need separate solution for online payments

Terminal replacement

Must use specific approved terminals

Plan for terminal costs in budget

SAQ D: When Nothing Else Applies

SAQ D is the full validation—all 300+ PCI DSS requirements. It's what you use when you don't qualify for any other SAQ.

Who Must Use SAQ D?

You need SAQ D if:

  • ❌ You store cardholder data (even encrypted or tokenized)

  • ❌ You have a complex payment environment that doesn't fit other SAQs

  • ❌ Your payment systems connect to other networks or systems in ways that don't meet other SAQ criteria

  • ❌ You're a service provider (unless you qualify for specific service provider SAQs)

  • ❌ You process payments in any way not covered by SAQs A through P2PE

The SAQ D Reality

Let me be blunt: SAQ D is expensive, time-consuming, and complex. But sometimes it's unavoidable.

I worked with a multi-location retailer that:

  • Stored tokens for recurring charges

  • Had networked POS systems

  • Ran a customer loyalty program with saved payment methods

  • Accepted payments online, in-store, and via mobile app

No way around it—they needed SAQ D.

Their annual compliance program costs:

  • QSA assessment: $45,000

  • Quarterly vulnerability scanning: $8,000

  • Penetration testing: $15,000

  • Remediation work: $35,000

  • Internal staff time: ~1,000 hours

Total annual cost: over $125,000

Was it worth it? For them, yes. Non-compliance would have cost significantly more in potential breach costs and the inability to process payments.

"SAQ D isn't punishment for doing something wrong. It's the reality for complex payment environments that require comprehensive security controls."

SAQ D Requirements Overview

All 12 PCI DSS requirement categories, fully implemented:

Requirement

What It Covers

Typical Challenge Areas

1. Firewalls

Network security perimeter

Complex network architectures

2. System Hardening

Secure configurations

Legacy systems, vendor defaults

3. Protect Stored Data

Data encryption, retention

Database security, key management

4. Encryption in Transit

Secure transmission

Certificate management, SSL/TLS

5. Anti-Malware

Malicious software protection

Server-based systems, Linux/Unix

6. Secure Systems

Patch management, secure development

Legacy applications, change control

7. Access Restrictions

Need-to-know access

Role definition, privilege management

8. User Authentication

User identification and authentication

Password policies, MFA implementation

9. Physical Access

Physical security controls

Multi-location businesses

10. Logging & Monitoring

Track and monitor access

Log aggregation, review processes

11. Security Testing

Regular testing and monitoring

Quarterly scans, annual penetration tests

12. Security Policies

Information security policy

Documentation, training, awareness

The SAQ Selection Decision Tree

After fifteen years of helping merchants select the right SAQ, I've developed a systematic approach. Here's my decision tree:

Step 1: How Do You Accept Payments?

Card-not-present only (e-commerce, phone, mail)?

  • ↓ Go to Step 2

Face-to-face (card-present)?

  • ↓ Go to Step 5

Both?

  • ↓ You likely need SAQ D (but continue to verify)

Step 2: E-Commerce SAQ Selection

Does card data touch your systems at all?

No - complete redirect to third party:

  • ✅ SAQ A (22 requirements)

Yes - embedded payment fields on your site:

  • ↓ Go to Step 3

Step 3: E-Commerce With Embedded Fields

Do you store any cardholder data or tokens?

No:

  • ✅ SAQ A-EP (178 requirements)

Yes:

  • ❌ SAQ D (300+ requirements)

Step 4: Virtual Terminal Assessment

Manual entry only via web-based virtual terminal?

Yes, and no other payment methods:

  • ✅ SAQ C-VT (30 requirements)

Also have e-commerce or other channels:

  • ↓ Assess each channel separately, use highest applicable SAQ

Step 5: Card-Present SAQ Selection

What type of terminals do you use?

Imprint machines or standalone dial-out terminals:

  • ✅ SAQ B (45 requirements) - rare in 2024

Standalone IP-connected terminals:

  • ↓ Go to Step 6

Integrated POS system:

  • ↓ Go to Step 7

Step 6: IP Terminal Assessment

Are terminals completely isolated from other networks/systems?

Yes - separate network, no connectivity to other systems:

  • ✅ SAQ B-IP (82 requirements)

No - connected to business network:

  • ↓ Go to Step 7

Step 7: Integrated POS Assessment

Do you use PCI-validated P2PE hardware solution?

Yes - solution listed on PCI SSC website:

  • ✅ SAQ P2PE-HW (35 requirements)

No:

  • ↓ Go to Step 8

Step 8: Storage and Environment Check

Do you store cardholder data after authorization?

Yes - ANY storage (encrypted, tokenized, anything):

  • ❌ SAQ D (300+ requirements)

No:

  • ✅ SAQ C (160 requirements)

Common SAQ Selection Mistakes (And How to Avoid Them)

After reviewing hundreds of SAQ submissions, I've seen the same mistakes repeatedly. Let me save you the pain:

Mistake #1: Choosing SAQ Based on Desire, Not Reality

The Error: "We want to be SAQ A because it's shortest, so we'll make our environment fit."

The Reality: Your environment determines your SAQ, not the other way around.

What I've Seen: A subscription service tried to force themselves into SAQ A by claiming their payment flow was "completely outsourced." During validation, I discovered they:

  • Stored Stripe customer IDs and payment method tokens

  • Had API integration that touched payment data

  • Maintained a database of billing information

They spent three months on the wrong SAQ and had to start over with SAQ D.

The Fix: Honestly assess your actual payment flow before selecting an SAQ. Document every system that touches payment data, no matter how peripherally.

Mistake #2: Misunderstanding "Storage"

The Error: "We don't store card numbers, so we don't store cardholder data."

The Reality: Storage includes:

  • Card numbers (obviously)

  • Expiration dates

  • Cardholder names (when associated with payment data)

  • Payment tokens (yes, even third-party tokens)

  • Audio recordings with payment information

  • Screenshots with payment data

  • Backup files with payment information

  • Log files with payment data

What I've Seen: A call center recorded calls for quality assurance. They claimed they didn't store card data because they didn't save the numbers themselves. But those audio recordings included customers reading their card information aloud. That's storage, and it disqualified them from their chosen SAQ.

The Fix: Conduct a thorough data flow analysis. Track everywhere payment information might exist, in any form.

Mistake #3: Ignoring Network Connectivity

The Error: "Our payment terminals are standalone, so we qualify for SAQ B-IP."

The Reality: If your "standalone" terminals connect to the same network as other systems, they're not truly standalone.

What I've Seen: A retail chain used what they called "standalone" Square terminals. Technically true—they weren't connected to a POS. But they connected to the store's Wi-Fi, which also connected to:

  • Employee tablets

  • Security cameras

  • Guest Wi-Fi

  • Back-office computers

That shared network connection disqualified them from SAQ B-IP.

The Fix: Create network diagrams showing all connections. If payment systems share ANY network infrastructure with other systems, you likely need a higher SAQ level.

Mistake #4: Trusting Vendor Claims Without Verification

The Error: "Our payment processor told us we're SAQ A compliant."

The Reality: Payment processors often don't fully understand your environment. They know their part but not your whole picture.

What I've Seen: A merchant's processor assured them they could use SAQ A because the processor "handled everything." During my assessment, I found the merchant's order management system stored last-four digits and expiration dates "for customer service purposes." The processor didn't know about this internal system.

The Fix: Never accept compliance advice from vendors alone. Conduct your own assessment or hire an independent QSA.

Mistake #5: Assuming Mobile Apps Are Like Websites

The Error: "Our mobile app uses the same payment provider as our website, so it's the same SAQ."

The Reality: Mobile apps present unique challenges and may require different SAQs than web applications.

What I've Seen: A food delivery app used Stripe for both web and mobile payments. Their website qualified for SAQ A-EP (payment fields embedded in web page). Their mobile app, however, collected payment data in the app before submitting to Stripe—requiring SAQ D.

The Fix: Assess each payment channel independently. Web, mobile, phone, and in-person may each have different SAQ requirements.

The Validation Process: What Happens After You Choose

Selecting the right SAQ is just the beginning. Here's what the validation process looks like:

Annual Validation Timeline

Month

Activity

Who's Involved

Typical Cost

1-2

Gap assessment, scope definition

Internal team + consultant

$5,000-$15,000

3-4

Remediation work

IT team, developers

Variable

5-6

Internal testing, evidence collection

Internal team

Internal hours

7-8

Quarterly vulnerability scan

ASV (Approved Scanning Vendor)

$2,000-$4,000

9-10

SAQ completion, documentation review

QSA or internal team

$3,000-$10,000

11

Attestation of Compliance submission

Management

$0

12

Continuous monitoring begins

IT/Security team

Ongoing

What Acquirers Actually Verify

Your acquiring bank or payment processor will verify:

  1. SAQ Selection Appropriateness: Did you choose the right questionnaire?

  2. Completeness: Did you answer all applicable questions?

  3. Evidence: Can you demonstrate compliance with documented controls?

  4. Attestation: Did an authorized representative sign the attestation?

  5. Scanning: Do you have clean quarterly vulnerability scans?

  6. Remediation: Have you addressed any identified vulnerabilities?

When Acquirers Reject Your SAQ

I've seen acquirers reject SAQ submissions for:

  • Wrong SAQ type selected

  • Incomplete answers or missing sections

  • Insufficient evidence of controls

  • Failed vulnerability scans

  • Unsigned attestation documents

  • Expired documentation

Impact of rejection: Your merchant account may be frozen until compliance is demonstrated. I've seen this happen, and it's devastating for cash flow.

The Cost Reality: Budgeting for SAQ Compliance

Let me give you realistic cost expectations based on my experience:

SAQ A Compliance Costs

Cost Category

Annual Cost

Notes

Self-assessment

$500-$2,000

Internal time or consultant review

Documentation

$1,000-$2,000

Policies, procedures

Training

$500-$1,000

Security awareness

Total

$2,000-$5,000

Lowest-cost option

SAQ A-EP Compliance Costs

Cost Category

Annual Cost

Notes

Gap assessment

$3,000-$8,000

Initial scoping and planning

Remediation

$10,000-$30,000

Implementing required controls

Vulnerability scanning

$2,000-$4,000

Quarterly ASV scans

Internal audit

$5,000-$10,000

Evidence collection, testing

Documentation

$3,000-$5,000

Comprehensive policy development

Training

$2,000-$4,000

Employee security awareness

Total Year 1

$25,000-$61,000

Higher initial costs

Total Ongoing

$12,000-$23,000

Annual maintenance

SAQ B-IP Compliance Costs

Cost Category

Annual Cost

Notes

Network segmentation

$2,000-$8,000

One-time setup for isolation

Self-assessment

$2,000-$5,000

Internal or consultant review

Vulnerability scanning

$1,500-$3,000

Quarterly scans

Documentation

$2,000-$4,000

Policies and procedures

Training

$1,000-$2,000

Security awareness

Total Year 1

$8,500-$22,000

Including network changes

Total Ongoing

$6,500-$14,000

Annual maintenance

SAQ C/D Compliance Costs

Cost Category

Annual Cost

Notes

QSA assessment

$20,000-$60,000

External validation required

Gap assessment

$8,000-$15,000

Comprehensive scoping

Remediation

$30,000-$150,000

Environment-dependent

Vulnerability scanning

$4,000-$8,000

Quarterly external and internal scans

Penetration testing

$15,000-$35,000

Annual requirement for SAQ D

Documentation

$10,000-$20,000

Extensive policy development

Training

$5,000-$10,000

Comprehensive security program

Total Year 1

$92,000-$298,000

High initial investment

Total Ongoing

$54,000-$133,000

Annual maintenance and validation

"PCI DSS compliance isn't just a cost—it's an insurance policy against breach costs that average $4.88 million. When you frame it that way, even SAQ D starts looking reasonable."

Pro Tips From the Trenches

After fifteen years of PCI DSS work, here are my hard-won lessons:

1. Document Everything From Day One

Don't wait until SAQ time to start documenting. Create a compliance folder and maintain:

  • Network diagrams (update whenever changes occur)

  • Data flow diagrams (showing exactly where card data goes)

  • System inventory (all systems that could touch payment data)

  • Vendor list (every third party involved in payments)

  • Change logs (what changed, when, why)

I've seen merchants spend $15,000 recreating this documentation during validation because they didn't maintain it ongoing.

2. Scope Reduction Is Your Best Friend

Every system you remove from scope is requirements you don't have to validate.

Strategies that work:

  • Network segmentation (isolate payment systems)

  • Tokenization (replace card data with tokens)

  • P2PE solutions (encrypt at point of interaction)

  • Third-party hosting (move processing out of your environment)

I helped a retailer reduce their PCI scope by 78% through network segmentation. Their compliance costs dropped from $85,000 to $28,000 annually.

3. Choose Your Payment Partners Wisely

Your payment provider choice dramatically impacts your SAQ eligibility.

Questions to ask providers:

  • What SAQ types do your integration methods support?

  • Are you PCI DSS Level 1 certified?

  • Do you offer validated P2PE solutions?

  • What evidence of compliance can you provide?

  • How do you handle security incidents?

I've seen merchants locked into expensive compliance programs because they chose providers that didn't support optimal integration methods.

4. Plan for the Long Term

Don't just think about achieving compliance—think about maintaining it.

Sustainability factors:

  • Can your team maintain the controls without external help?

  • Are the processes documented well enough that new employees can follow them?

  • Do you have monitoring in place to detect when things drift out of compliance?

  • Have you budgeted for ongoing costs, not just initial implementation?

5. Start Higher Than You Think You Need

If you're uncertain between two SAQ types, start with the higher one.

Why? Because moving from SAQ A to SAQ D mid-year is devastating. Moving from SAQ D to SAQ A next year is just good news.

I always tell clients: "Better to over-comply initially and scale down once you're certain of your eligibility."

Real-World SAQ Selection Examples

Let me walk you through some actual scenarios I've helped clients navigate:

Case Study 1: The SaaS Startup

Business: Subscription management software Payment method: Stripe integration for recurring billing Initial assumption: SAQ A (they redirect to Stripe) Actual requirement: SAQ D

Why the difference:

  • They stored Stripe customer IDs and payment method tokens

  • Tokens were stored in their application database

  • Even though tokens weren't real card numbers, they enabled charging customers

  • This constituted "cardholder data" under PCI DSS

Resolution:

  • Evaluated whether they truly needed to store tokens

  • Determined recurring billing required token storage

  • Implemented SAQ D controls

  • Annual cost: $45,000 (vs. $3,000 if they'd qualified for SAQ A)

Lesson: Payment tokens are cardholder data for PCI DSS purposes.

Case Study 2: The Restaurant Chain

Business: 15-location fast-casual restaurant Payment method: Toast POS system Initial assumption: SAQ B-IP (standalone IP terminals) Actual requirement: SAQ C

Why the difference:

  • Toast POS connected payment terminals to back-office systems

  • Same network carried payment data, kitchen display data, and inventory data

  • This integration meant payment systems weren't "standalone"

Resolution:

  • Acknowledged integrated environment reality

  • Implemented SAQ C controls

  • Focused on network segmentation to limit scope

  • Annual cost: $32,000

Lesson: Modern "cloud-based" POS systems are rarely standalone.

Case Study 3: The B2B Manufacturer

Business: Industrial equipment manufacturer Payment method: Phone orders with virtual terminal Initial assumption: SAQ C-VT (virtual terminal only) Actual requirement: SAQ D

Why the difference:

  • They recorded all sales calls for quality assurance

  • Recordings included customers providing payment information

  • Audio recordings constituted "stored cardholder data"

  • Additionally, they had a small e-commerce site for parts

Resolution:

  • Stopped recording during payment collection

  • Assessed e-commerce site separately

  • Implemented controls for both channels

  • Used SAQ D due to multiple channels

  • Annual cost: $58,000

Lesson: Audio/video recordings with payment info = stored cardholder data.

Case Study 4: The Boutique Hotel

Business: 45-room boutique hotel Payment method: Property management system with integrated payments Initial assumption: SAQ C (integrated payment application) Actual requirement: SAQ P2PE-HW

Why the difference:

  • Their PMS provider offered a validated P2PE solution

  • By switching to P2PE terminals, they dramatically reduced scope

  • Payment data encrypted immediately at swipe

  • Their systems never saw clear-text card data

Resolution:

  • Upgraded to P2PE-validated terminals (cost: $2,800)

  • Implemented SAQ P2PE-HW controls

  • Annual compliance cost dropped from projected $28,000 to $6,000

  • Net savings: $21,200 annually

Lesson: P2PE can dramatically reduce compliance scope and cost.

Your Action Plan: Selecting the Right SAQ

Here's exactly what you should do right now:

This Week

Day 1-2: Document Your Payment Flow Create a comprehensive map:

  • How do customers provide payment information?

  • What systems touch that data?

  • Where does data go after collection?

  • What happens after authorization?

  • Where might data be stored?

Day 3-4: Assess Each Payment Channel For each way you accept payments:

  • What technology is used?

  • Who provides that technology?

  • What integration method is employed?

  • Does data touch your systems?

  • Is any data stored anywhere?

Day 5: Initial SAQ Selection Based on your documentation, identify your likely SAQ using the decision tree provided earlier.

This Month

Week 2: Verify Your Selection

  • Review PCI SSC's SAQ guidance documents

  • Consult with your payment provider

  • Consider hiring a QSA for initial assessment

  • Document your selection rationale

Week 3: Gap Assessment

  • Review all requirements for your selected SAQ

  • Identify which controls you already have

  • Document gaps that need addressing

  • Estimate remediation effort and cost

Week 4: Create Implementation Plan

  • Prioritize remediation activities

  • Assign responsibilities

  • Set realistic timelines

  • Budget for necessary work

This Quarter

Month 2: Remediation

  • Implement missing controls

  • Update documentation

  • Configure systems properly

  • Test all implementations

Month 3: Validation Preparation

  • Collect evidence of compliance

  • Complete SAQ questionnaire

  • Arrange quarterly vulnerability scan

  • Prepare attestation documents

Final Thoughts: The SAQ Selection That Saves You

I started this article with a story about choosing the wrong SAQ. Let me end with a different story.

In 2020, I worked with a mid-sized e-commerce company facing their first PCI DSS validation. They brought me in early—before they'd made any technology decisions about their new payment integration.

We mapped out three different implementation approaches:

  1. Custom integration pulling payment fields into their checkout - SAQ A-EP (178 requirements)

  2. Hosted payment page with complete redirect - SAQ A (22 requirements)

  3. Hybrid approach with embedded fields but strategic scope reduction - SAQ A-EP with limited scope

They chose option 2—complete redirect—even though it meant slightly less control over the checkout experience.

Result:

  • Initial compliance cost: $4,200

  • Ongoing annual cost: $3,800

  • Time to compliance: 6 weeks

  • No impact to conversion rates

If they'd chosen the custom integration without thinking about PCI implications, they would have faced:

  • Initial compliance cost: $38,000

  • Ongoing annual cost: $18,000

  • Time to compliance: 6 months

  • Significant ongoing compliance burden

The difference: $34,000 in year one alone.

That's the power of choosing the right SAQ from the beginning.

"The best time to think about PCI DSS compliance is before you write a single line of code or configure a single payment terminal. The second-best time is right now."

Your SAQ selection isn't just about checking a box. It's a strategic business decision that impacts your costs, your risks, and your operational burden for years to come.

Choose wisely. Choose honestly. Choose based on your actual environment, not your desired environment.

And if you're uncertain? Bring in an expert before you commit to a payment architecture that locks you into expensive compliance obligations.

Your business—and your budget—will thank you.

69

RELATED ARTICLES

COMMENTS (0)

No comments yet. Be the first to share your thoughts!

SYSTEM/FOOTER
OKSEC100%

TOP HACKER

1,247

CERTIFICATIONS

2,156

ACTIVE LABS

8,392

SUCCESS RATE

96.8%

PENTESTERWORLD

ELITE HACKER PLAYGROUND

Your ultimate destination for mastering the art of ethical hacking. Join the elite community of penetration testers and security researchers.

SYSTEM STATUS

CPU:42%
MEMORY:67%
USERS:2,156
THREATS:3
UPTIME:99.97%

CONTACT

EMAIL: [email protected]

SUPPORT: [email protected]

RESPONSE: < 24 HOURS

GLOBAL STATISTICS

127

COUNTRIES

15

LANGUAGES

12,392

LABS COMPLETED

15,847

TOTAL USERS

3,156

CERTIFICATIONS

96.8%

SUCCESS RATE

SECURITY FEATURES

SSL/TLS ENCRYPTION (256-BIT)
TWO-FACTOR AUTHENTICATION
DDoS PROTECTION & MITIGATION
SOC 2 TYPE II CERTIFIED

LEARNING PATHS

WEB APPLICATION SECURITYINTERMEDIATE
NETWORK PENETRATION TESTINGADVANCED
MOBILE SECURITY TESTINGINTERMEDIATE
CLOUD SECURITY ASSESSMENTADVANCED

CERTIFICATIONS

COMPTIA SECURITY+
CEH (CERTIFIED ETHICAL HACKER)
OSCP (OFFENSIVE SECURITY)
CISSP (ISC²)
SSL SECUREDPRIVACY PROTECTED24/7 MONITORING

© 2026 PENTESTERWORLD. ALL RIGHTS RESERVED.