Common PCI DSS Compensating Control Examples
This article provides examples of common compensating controls
Common PCI DSS Compensating Control Examples
Overview
Compensating controls are sometimes necessary in environments where meeting a PCI DSS requirement exactly as written is not technically feasible.
In these cases, organisations may implement alternative controls that:
-
Meet the intent of the requirement
-
Provide equivalent or stronger protection
-
Are documented in a Compensating Control Worksheet (CCW)
-
Are approved by an assessor (where applicable)
Below are common scenarios seen in modern SaaS organisations.
Example 1: Legacy system cannot support MFA
Requirement intent
Administrative access must be strongly authenticated (MFA).
Common SaaS constraint
A legacy billing or payment-related system does not support MFA directly.
Compensating control approach
Implement layered controls such as:
-
Access only via a hardened jump server with MFA enforced
-
Strict IP allowlisting (no open internet access)
-
Network segmentation isolating the legacy system
-
Enhanced logging and alerting for all privileged activity
-
Short session timeouts and frequent access review
Why this works
Even though MFA cannot be enabled on the system itself, access is still protected by equivalent controls.
Example 2: Cardholder environment cannot be fully segmented as designed
Requirement intent
Limit scope and exposure by isolating the CDE.
Common constraint
Cloud-native architectures may have shared services that complicate segmentation.
Compensating controls
-
Strong identity-based access controls at the cloud layer
-
Separate accounts/subscriptions for payment workloads
-
Micro-segmentation using security groups and policies
-
Continuous monitoring of traffic flows
-
Regular segmentation testing evidence
Key point
Segmentation must be demonstrable, even if implemented differently from traditional networks.
Example 3: Inability to meet a specific log retention mechanism
Requirement intent
Security logs must be retained and available for review.
Constraint
A SaaS platform may not support native long-term retention on certain managed services.
Compensating controls
-
Export logs to a central SIEM or immutable storage
-
Enable write-once storage controls
-
Implement automated alerts on critical events
-
Maintain documented review procedures
Outcome
Log integrity and availability are maintained even if retention is outsourced.
Example 4: Vulnerability scanning tool limitations in cloud environments
Requirement intent
Systems must be regularly scanned for vulnerabilities.
Constraint
Traditional scanning tools may not cover ephemeral workloads (containers, serverless).
Compensating controls
-
Use container image scanning in CI/CD pipelines
-
Continuous dependency monitoring (SCA tools)
-
Cloud-native vulnerability management services
-
Defined remediation SLAs and tracking
Why it is acceptable
Security outcomes are achieved through modern tooling rather than legacy scanners.
Example 5: Encryption requirement met through tokenisation
Requirement intent
Stored cardholder data must be unreadable.
SaaS/FinTech reality
Most organisations avoid storing PAN entirely.
Compensating control approach
-
Use tokenisation from the payment provider
-
Ensure no PAN storage in internal databases
-
Implement controls preventing card data capture in logs
-
Regular checks that only tokens are stored
Important note
Tokenisation is often a better control than encryption when properly implemented.
Example 6: Secure development controls for small engineering teams
Requirement intent
Software must be developed securely.
Constraint
Early-stage SaaS companies may not have formal SDLC processes yet.
Compensating controls
-
Mandatory peer code review via pull requests
-
Automated security testing in CI/CD
-
Separation between dev and production environments
-
Controlled release approval workflows
Outcome
Security assurance is maintained without heavyweight bureaucracy.
Example 7: Physical security controls in remote-first organisations
Requirement intent
Prevent unauthorised physical access to systems in scope.
Constraint
SaaS companies may have no central office or use managed co-working spaces.
Compensating controls
-
No on-premise cardholder systems at all
-
Cloud-only payment environments
-
Strong endpoint controls for staff devices
-
Identity-based access restrictions and logging
Key point
Reducing physical scope entirely is often the strongest approach.
Example 8: Third-party managed services reduce direct control
Requirement intent
Service providers must be managed securely.
Constraint
Organisations rely heavily on cloud providers, PSPs, and MSPs.
Compensating controls
-
Document shared responsibility clearly
-
Maintain supplier due diligence records
-
Require PCI compliance attestations from providers
-
Restrict and monitor third-party access
-
Annual reassessment of supplier risk
Why it matters
Outsourcing does not outsource accountability.
Example 9: Patch timelines cannot always meet strict schedules
Requirement intent
Critical vulnerabilities must be remediated promptly.
Constraint
Regulated FinTech environments may require extended testing before patching production.
Compensating controls
-
Temporary risk mitigations (WAF rules, network restrictions)
-
Enhanced monitoring until patch deployment
-
Formal risk acceptance with approval
-
Accelerated patching for the highest-risk systems
Outcome
Risk is controlled even when patching is delayed for valid reasons.
Example 10: Requirement met through stronger alternative controls
Requirement intent
Reduce exposure to cardholder data.
SaaS best practice
Instead of compensating for missing controls, many SaaS firms reduce scope entirely by:
-
Fully outsourcing payments
-
Using hosted checkout pages
-
Eliminating PAN handling internally
This often results in SAQ A rather than SAQ D — the strongest form of “compensating” is removing card data from your environment.
Best practice guidance
Compensating controls should always be:
-
Rare and well-justified
-
Approved internally and documented formally
-
Reviewed regularly
-
Supported by strong, audit-ready evidence
Assessors are far more likely to accept compensating controls that are:
✅ layered
✅ measurable
✅ continuously monitored
✅ clearly risk-reducing
Key takeaway
SaaS organisations often rely on modern architectures that don’t map perfectly to traditional PCI controls. Compensating controls allow flexibility, but only when they clearly deliver equivalent security outcomes and are properly documented.