Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

PCI DSS

Ensure PCI compliance. Any organization that stores, processes, transmits, or supports the security of credit card data may need to comply with PCI DSS.

Comprehensive PCI Services

TrustedSec is a Qualified Security Assessor Company (QSAC) through the PCI SSC. TrustedSec employs many QSAs, some of whom have been in place since the PCI SSC began the program nearly 20 years ago. TrustedSec QSAs will recognize and suggest the best options available, from PCI Readiness Assessment to PCI SAQ Assistance and issuance of a PCI DSS Report on Compliance (ROC).

Scoping and Gap Assessments

As the first steps in ensuring PCI compliance, scoping and gap assessments include having the appropriate people, processes, and technical controls aligned to an organization’s compliance scope. Whether the organization is new to PCI or is already compliant but new to the latest DSS version 4, TrustedSec is able to help.

SAQ Assistance

Depending on transaction levels, merchants and service providers may be able to report compliance with a Self-Assessment Questionnaire (SAQ). Depending on the in-scope payment channels, an organization may be able to test fewer controls than the full SAQ type D and the entire DSS. While completing an SAQ report can help reduce the cost and burden of reporting PCI compliance, all in-scope requirements must be verified as in place. TrustedSec can help reduce the organization's burden in verifying compliance and provide independent attestation that compliant operations are in place.

PCI ROC Assessment

The PCI ROC Assessment is a formal assessment performed by a PCI QSA. It includes on-site interviews with subject-matter experts, review of documentation and evidence, and samples of key systems to ensure that controls are in place. At the end of the engagement, two (2) artifacts will be produced reflecting the compliance status of the payment processing or supporting environment, including a ROC and an Attestation of Compliance (AOC).

PCI ASV Vulnerability Scans

For vulnerability scanning requirements needing an Approved Scanning Vendor (ASV), TrustedSec offers these PCI services. Compliant ASV scan reports identify known vulnerabilities at least every 3 months.

PCI Penetration Testing

PCI Penetration Testing employs blended threat scenarios to test the effectiveness of your cardholder environment as required by the Payment Card Industry Data Security Standard (PCI DSS).

PCI Implementation Guidance

Every organization has unique challenges, is in a different place, and needs to approach solutions at a different pace. By utilizing TrustedSec's resources, a constant measure of guidance can be shared over time.

“Having access to industry leaders right here at TrustedSec makes solving our clients' challenges easier.”
Paul SemsManaging Director of Remediation Services
Webinars March 29 2023

The Value of Compliance: Minimizing the Impact of PCI DSS 4.0

Get practical advice and resources to help your business navigate the road ahead from our expert speaker, Chris Camejo, Compliance Services practice lead and a…

Read about this article
Webinars July 20 2023

PCI Dream Team: PCI 4.0 and New Book Release

Coop

Read about this article
Webinars April 15 2026

You Had Us at the First Alert: A Guide to Finding Frequently Missed Detections

Join us for this webinar to get a clearer picture of where your detection coverage has blind spots and a practical roadmap for closing them before a real…

Read about this article
Blog March 24 2026

Building a Detection Foundation: Part 4 - Sysmon

Filling the Gaps Native Logging Can'tAt this point in our series, we have Windows Security events capturing logon sessions and process creation, and…

Read about this article
Blog March 19 2026

Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found

Invisible password sprays. Invisible logins. Full tokens returned.Nyxgeek here. It's 2026 and I've got two more Azure Entra ID sign-in log bypasses…

Read about this article
Webinars March 18 2026

Copilot Security: What to Know Before You Go

In this webinar, our experts will walk you through the critical groundwork needed before deploying Microsoft 365 Copilot. Learn how you can best prepare for…

Read about this article
Blog March 17 2026

Better Together: Combining Automation and Manual Testing

When I started working in mobile application security in 2018, most testing was still largely manual. Since then, the ecosystem has exploded with scanners,…

Read about this article
Blog March 12 2026

LnkMeMaybe - A Review of CVE-2026-25185

A Windows shortcut (.lnk) seems very simple on the surface. It is a file that points somewhere and tells the system to open or execute a resource. A shortcut…

Read about this article
Blog March 10 2026

Building a Detection Foundation: Part 3 - PowerShell and Script Logging

The Second Most Important Data Source You're Probably Not CapturingIn Part 2, we enabled process creation logging with command lines. That's a big…

Read about this article
Blog March 05 2026

Building a Detection Foundation: Part 2 - Windows Security Events

The Audit Policies Nobody ConfiguresIn Part 1, we looked at why relying on a single telemetry source is a recipe for blind spots. Now let's get practical.…

Read about this article