1.35 billion people were affected by data breaches last year. Here's how to protect your customers and stay compliant with PCI DSS 4.0.
DISCLAIMER: This checklist provides general guidance only; consult your legal counsel and a Qualified Security Assessor (QSA) for advice specific to your organization.
With 1.35 billion people affected by data compromises in 2024 and card-not-present representing over 70% of credit card fraud, securing payment data isn't optional, it's survival.
As of March 31, 2025, PCI DSS 4.0's future-dated requirements are mandatory, and non-compliance fines can reach $5,000 to $100,000 per month.
For contact centers processing voice payments, the challenge multiplies. Every agent conversation, IVR interaction, and AI assistant handling card data expands your compliance scope. The good news? With the right approach, you can minimize PCI scope while modernizing operations.
Your transaction volume determines your merchant level and compliance requirements. Level 1 merchants (processing over 6 million transactions annually) face the strictest requirements, including quarterly network scans and annual on-site audits. Smaller merchants complete Self-Assessment Questionnaires (SAQs) instead of full audits.
Contact centers commonly fall under SAQ C-VT for virtual terminals or SAQ D for merchants with direct cardholder data storage. Choosing the wrong SAQ wastes resources and creates compliance gaps that auditors will catch.
PCI DSS 4.0 organizes requirements into 12 core areas. Here's your prioritized checklist for meeting each requirement:
Map every system that processes, stores, or transmits payment card data. Include voice recordings, chat transcripts, and AI agent interactions. Without accurate scoping, you'll either over-invest in unnecessary controls or miss critical vulnerabilities.
Select your SAQ based on actual payment channels and data flows. Contact centers typically need:
Isolate payment processing systems from general corporate networks. Use VLANs, firewalls, and access controls to create clear boundaries. Proper segmentation significantly reduces the number of systems subject to PCI DSS requirements, lowering both audit complexity and compliance costs.
Apply these encryption standards across your infrastructure:
| Data state | Minimum standard | Scope impact |
|---|---|---|
| Data in transit | TLS 1.2+ / SRTP | Protects VoIP signaling and media |
| Data at rest | AES-128 or higher | Reduces recording risk |
| Voice channels | DTMF masking | Removes sensitive data from recordings |
| API calls | HTTPS only | Secures integrations |
When customers enter card numbers via phone keypad, DTMF tones create compliance risk. Implement tone suppression at the network level, not just in recordings. Add pause/resume controls so agents can stop recording during payment capture.
Enforce multi-factor authentication (MFA) for all CDE access. Implement role-based permissions with quarterly reviews. Terminate access immediately when employees leave or change roles.
Capture authentication attempts, configuration changes, and data access. Organizations with automated security save $1.9 million in breach costs compared to manual processes. Set up real-time alerts for suspicious patterns.
Use an Approved Scanning Vendor (ASV) for external scans. Apply critical and high-risk security patches within 30 days of release, and address other vulnerabilities based on your documented risk ranking policy. With the average time to identify and contain a breach at 258 days, proactive scanning catches issues before criminals do.
Document breach response workflows including notification timelines, forensics processes, and communication templates. Run tabletop exercises quarterly. The average breach in financial services costs $6.08 million. Preparation reduces both likelihood and impact.
Review code for security vulnerabilities before production deployment. Use static and dynamic application security testing (SAST/DAST). Train developers on secure coding standards specific to payment processing.
Create written standards for password complexity, data retention, vendor management, and change control. Update documentation within 30 days of any process change. Missing documentation fails audits even with perfect technical controls.
Submit your completed SAQ, vulnerability scan results, and Attestation of Compliance (AOC) to your acquiring bank. Level 1 merchants also need a Report on Compliance (ROC) from a Qualified Security Assessor (QSA).
Voice payments present unique compliance challenges. Every conversation potentially captures sensitive card data through speech recognition or DTMF tones. These strategies minimize your exposure:
Building PCI-compliant voice infrastructure requires coordinating multiple vendors—carriers for PSTN access, platforms for call control, providers for speech services, and tools for recording management. Each integration point creates potential vulnerabilities and compliance gaps.
Telnyx consolidates this complexity through full-stack control. Our carrier-grade private IP network provides encryption for voice signaling (TLS 1.3) and media (SRTP), with security controls designed for regulated industries. Key capabilities include:
For teams modernizing with AI assistants, Telnyx enables segregated payment flows where voice AI agents handle initial authentication and payment capture, then transfer sanitized calls to human agents. This pattern maintains TCPA compliance while reducing PCI scope.
With all requirements now mandatory, organizations face immediate compliance pressure. Recent breaches underscore the urgency, from Honda's e-commerce platform vulnerability exposing 21,000+ customer orders to Luxottica's 2021 breach leaking 70 million customer records.
Start with accurate scoping to avoid over-engineering. Map your actual cardholder data flows, then implement controls based on real risk rather than assumptions. For contact centers, focus first on removing agents from scope through IVR segregation and DTMF masking.
Achieving PCI compliance requires both technical controls and operational discipline. Begin with these immediate actions:
For organizations handling voice payments, consider how AI agents can reduce scope while improving customer experience. Modern platforms that combine communications infrastructure with AI enable compliant automation patterns previously requiring complex multi-vendor deployments.
Remember that compliance is ongoing, not one-time. Regular testing, documentation updates, and control monitoring prevent the drift that leads to breaches. With proper preparation and the right infrastructure partner, you can meet PCI requirements while actually improving operational efficiency.
Learn more about building compliant communications systems or explore how SMS payment reminders can shift transactions away from high-risk voice channels.
Ready to minimize PCI compliance risk while modernizing your contact center? Telnyx's unified platform combines carrier-grade infrastructure with AI capabilities: secure payment flows that keep sensitive data away from agents and recordings.
Talk to our team about building PCI-compliant voice payment solutions, or explore our Voice AI platform to see how AI agents can handle payment capture while reducing PCI scope.
DISCLAIMER: This checklist provides general guidance only and is not intended as, nor should it be construed as, legal, financial, or professional compliance advice. Telnyx disclaims all liability arising from reliance on this content. Consult your legal counsel and a Qualified Security Assessor (QSA) for advice specific to your organization.
Related articles