Compliance Framework

PCI-DSS v4.0 — enforced at the code layer.

Cardholder data security starts in the code that handles it. MergeGuide maps all 12 PCI-DSS requirements to code-level detection patterns, enforcing at write time and generating QSA-ready evidence artifacts.

Why code-level PCI enforcement matters

PCI-DSS audits focus heavily on network security, access control, and encryption — all of which have code-level implementations that can introduce violations. A misconfigured TLS setting, a forgotten debug endpoint, a hardcoded API key: these are the vulnerabilities that get organizations into trouble.

MergeGuide enforces PCI-DSS requirements where they originate — in the source code — before they ever reach production. Violations are caught at write time, not at audit time.

PCI-DSS v4.0 ready: MergeGuide templates are mapped to PCI-DSS v4.0, which became mandatory in April 2024. All detection patterns are current with the v4.0 requirement numbering and clarifications.

Requirement coverage

  • R2 Apply secure configurations to all system components
  • R3 Protect stored account data — PANs, CVVs, encryption requirements
  • R4 Protect cardholder data in transit with strong cryptography
  • R6 Develop and maintain secure systems and software
  • R7 Restrict access to system components by business need
  • R8 Identify users and authenticate access to system components
  • R10 Log and monitor all access to system components and CHD
  • R12 Support information security with organizational policies

PCI-DSS detection examples

Requirement What MergeGuide Detects Severity
R3.3.1Sensitive authentication data (CVV, PIN) stored after authorizationCritical
R3.4.1Primary Account Numbers (PANs) stored unencryptedCritical
R3.5.1Weak encryption algorithms (DES, 3DES, MD5 for PAN hashing)Critical
R4.2.1CHD transmitted without TLS or over deprecated TLS 1.0/1.1Critical
R6.2.4SQL injection, XSS, and common attack patterns in payment code pathsCritical
R6.3.2Unauthorized or outdated payment software components in dependency treeHigh
R8.2.1Hardcoded credentials or API keys in payment system codeCritical
R8.3.6Password/passphrase policies below PCI-DSS minimum requirementsHigh
R10.3.2Audit log protection — logs writable without detection mechanismHigh
💳

PAN detection

Pattern matching for Primary Account Numbers in code, logs, and configuration — including masked and tokenized forms that indicate improper storage.

🔒

Encryption enforcement

Detects weak algorithms, improper key management patterns, and unencrypted CHD in transit — mapped to specific R3 and R4 sub-requirements.

📋

QSA-ready evidence

Evidence artifacts include PCI-DSS requirement mappings. OSCAL Component Definition export provides the machine-readable control implementation statement your QSA needs.

Preparing for PCI-DSS assessment?

Talk to us about how MergeGuide can reduce your assessment scope and accelerate the QSA review process.

Book a demo Talk to sales