Bright Hosting se développe par le biais d’acquisitions. Vendez votre société d’hébergement WordPress à un partenaire Automattic et à un partenaire AWS.
Connectons-nous
logo Bright Hosting

Le Black Friday est arrivé ! 20 % de réduction sur TOUS nos forfaits

coupon: Black Friday 20% de réduction
Conformité PCI : Comprendre les niveaux d'hébergement et ce qu'ils signifient

Conformité PCI : Comprendre les niveaux d'hébergement et ce qu'ils signifient

Contenu

You set up a WooCommerce store, connected a payment gateway, and started processing orders. At some point, maybe from a payment processor or a security audit, someone mentioned PCI compliance. Now there are acronyms like DSS, SAQ, QSA, and ROC to sort through, and it's not immediately clear which ones actually apply.

The reality for most small store owners is simpler than it first appears. But "simpler" doesn't mean "optional," and the hosting environment a store runs on matters more than many people understand.

This guide explains how PCI compliance levels work, what they require of merchants, and what to look for in a hosting provider.

PCI Compliance Trends

For most WooCommerce merchants, the practical question isn't whether PCI applies; it's how much of the compliance burden actually lands on them. Most small merchants rely on outsourced payment gateways to minimize exposure, while hosting isolation and the adoption of security plugins remain important supporting factors.

What Is PCI Compliance, and Why Does It Apply to You?

PCI DSS stands for the Payment Card Industry Data Security Standard. It's a framework created by the major card brands to ensure that any business accepting card payments properly protects customer payment data. If a WooCommerce store processes credit or debit card transactions in any form, PCI DSS applies, regardless of size or monthly sales volume.

Even when a business never physically sees a customer's card number, it's still part of the payment chain. The moment a website collects, transmits, or redirects cardholder data, it falls within PCI scope. Compliance isn't about being a large enterprise; it's about reducing the risk of fraud, data breaches, and financial liability. If a store accepts card payments online, PCI compliance is not optional. It's part of operating responsibly and securely.

The Four PCI Merchant Compliance Levels

PCI DSS divides merchants into four compliance levels based primarily on the number of card transactions processed annually. While transaction volume is the main factor, the acquiring bank and payment processor ultimately determine official classification. These levels exist to scale validation requirements according to risk exposure. Higher transaction volumes carry broader breach exposure, which is why validation requirements scale accordingly.

Importantly, even the lowest level is not exempt from PCI DSS requirements. Validation simply becomes less complex. Merchants can also be moved to a higher level after a breach or if their processor deems them higher risk.

  • Level 1: More than 6 million card transactions per year across all channels, or any merchant that has suffered a data breach. Requires an annual on-site audit by a Qualified Security Assessor (QSA), a detailed Report on Compliance (ROC), quarterly external vulnerability scans by an Approved Scanning Vendor (ASV), and annual penetration testing.
  • Level 2: Between 1 million and 6 million transactions per year. Requires an annual Self-Assessment Questionnaire (SAQ), quarterly ASV scans, and, in some cases, QSA attestation depending on the acquiring bank.
  • Level 3: 20,000 to 1 million eCommerce transactions annually. Requires an annual SAQ, quarterly ASV scans, and an Attestation of Compliance (AOC).
  • Level 4: Fewer than 20,000 eCommerce transactions per year, which covers most small online stores. Requires an annual SAQ, quarterly ASV scans as required by the acquiring bank, and an Attestation of Compliance.

For most small WooCommerce stores, Level 4 applies, meaning compliance is primarily validated through documentation and regular scanning rather than full on-site audits. Specific obligations still depend heavily on how checkout is configured and whether cardholder data ever touches the server environment.

What Is a Self-Assessment Questionnaire?

For most small eCommerce businesses at PCI Levels 2 through 4, the Self-Assessment Questionnaire (SAQ) is the primary method of validating compliance. Think of the SAQ as a structured checklist rather than a simple form. It covers security controls across data protection, access control, system configuration, and vulnerability management, and answers determine whether an environment meets required standards or needs remediation before attesting to compliance.

There are multiple SAQ versions, and selecting the correct one depends entirely on how the checkout process handles payment data. The acquiring bank or payment processor ultimately confirms which version applies to each setup.

The two most relevant SAQ types for small eCommerce stores are:

  • SAQ A: For merchants who fully outsource payment processing to a PCI-compliant third party and do not store, process, or transmit cardholder data on their own systems. This is the simplest and lowest-scope option.
  • SAQ A-EP: For merchants who outsource payment processing but whose website still plays a role in directing or hosting payment data, such as embedding or hosting a payment form. This version includes additional security requirements because the website environment remains in scope.

One common point of confusion: merchants using embedded payment fields, such as Stripe Elements or Braintree's hosted fields, sometimes assume they qualify for SAQ A, but, depending on the implementation, SAQ A-EP may apply. Confirming this with a processor before completing the SAQ can prevent filling out the wrong form entirely.

Where Hosting Fits In

The hosting environment plays a significant role in determining the scope of PCI compliance. Many store owners focus only on their payment gateway, but PCI DSS requirements also extend to the servers and infrastructure supporting the website. If cardholder data passes through, is redirected by, or is influenced by the server environment, the hosting setup becomes part of the compliance equation.

Each hosting model carries its own compliance implications:

  • Hébergement partagé : Multiple websites share the same server resources. Lower cost, but limited isolation. If another site on the server is compromised, the risk can extend to neighboring sites depending on the configuration.
  • Hébergement VPS : Provides an isolated virtual environment with greater control over firewalls, updates, and access management, making application-layer compliance easier to manage.
  • Hébergement dédié : A fully isolated physical server offering maximum control and security customization, suited to higher compliance requirements.
  • Managed PCI-Compliant Hosting: Includes infrastructure-level security controls such as patching, monitoring, intrusion detection, and vulnerability management. This reduces the technical burden, though it doesn't remove application-layer responsibilities.

Choosing the right hosting tier directly influences the complexity of PCI obligations.

The Shared Responsibility Model

Many store owners assume that if a hosting provider is PCI compliant, the store is automatically covered. That's not how PCI DSS works. Compliance follows a shared responsibility model, meaning the host, the payment gateway, and the merchant each have defined obligations.

A hosting provider handles infrastructure security: data center protection, network controls, server hardening, and system-level patching. Merchants remain responsible for the application layer. That includes how WooCommerce is configured, which plugins are installed, how user access is managed, and whether vulnerabilities are addressed promptly. A compliant host reduces technical scope, but it doesn't remove accountability from the merchant accepting card payments.

A practical example: a host may handle OS-level patching on schedule, but if a store is running an outdated version of WooCommerce or a vulnerable plugin, that gap is the merchant's responsibility, not the host's.

What to Look for in a PCI-Compliant Host

Choosing a PCI-compliant host is about more than checking a marketing claim on a pricing page. It's about understanding whether the provider supports the specific technical and security requirements within a store's compliance scope. Some questions worth asking before signing up:

  • Does the provider hold documented PCI DSS certification? Requesting an Attestation of Compliance (AOC) is the right move. Marketing language isn't sufficient; documented evidence is what matters.
  • What level of isolation does the environment provide? Understanding whether the setup is on shared infrastructure or an isolated environment clarifies how it affects compliance scope.
  • What security features are included? Managed firewalls, intrusion detection, SSL/TLS, DDoS protection, and encrypted backups are all worth confirming.
  • Do they offer vulnerability scanning support? Quarterly ASV scans are a compliance requirement. Some providers include this or facilitate it directly.
  • How does the support team handle compliance-related issues? If a quarterly scan fails, the provider must respond and assist with remediation within a reasonable timeframe.
  • What are their responsibilities versus the merchant's? A reliable hosting partner can clearly articulate where their obligations end and where the merchant's begin.

If a host can't answer those questions, that's reason enough to keep looking.

The Simplest Path for Most Small Stores

For most small WooCommerce stores processing fewer than 20,000 eCommerce transactions per year, PCI compliance doesn't need to be overly complex. The key is to minimize the compliance scope from the start by keeping cardholder data off the server, limiting technical exposure, and clearly understanding which requirements apply at the merchant level.

A practical approach for most small stores includes:

  • Using a fully hosted, PCI-certified payment gateway such as Stripe, PayPal, or Square so card data doesn't touch the server.
  • Confirming the SAQ type with the payment processor or acquiring bank, which is often SAQ A for a fully outsourced checkout.
  • Hosting with a provider that supports PCI-aligned infrastructure security, even when the compliance scope is limited.
  • Completing an annual SAQ and required quarterly ASV scans to maintain documented compliance.

Keeping the payment flow simple and the infrastructure reasonably secure reduces both risk and administrative burden without overengineering the setup.

Recommended WooCommerce Security & PCI Support Plugins

PCI compliance isn't achieved solely through plugins; the right tools help strengthen application-layer security, support monitoring, and reduce compliance risk.

WooCommerce Stripe Payment Gateway

WooCommerce Stripe Payment Gateway

This official Stripe integration allows full outsourcing of card processing to Stripe's PCI-certified infrastructure. When configured using hosted fields or redirect checkout, it helps most small stores qualify for SAQ A by keeping card data off the server.

  • Hosted payment fields to reduce PCI scope
  • Apple Pay and Google Pay support
  • 3D Secure and Strong Customer Authentication (SCA)
  • Tokenized payments for saved cards

WooCommerce PayPal Payments

WooCommerce PayPal Payments

PayPal's official WooCommerce plugin enables hosted checkout experiences that reduce PCI compliance burden by keeping raw cardholder data out of the server.

  • Hosted checkout with off-site processing
  • Pay Later and Venmo support
  • Secure vaulting and tokenization
  • Built-in fraud protection tools

Sécurité Wordfence

Sécurité Wordfence

Addresses application-layer security, which falls under the merchant's PCI responsibility in the shared responsibility model.

  • Web Application Firewall (WAF)
  • Malware scanning and threat detection
  • Login attempt limiting and two-factor authentication
  • Real-time IP blocking and security event logging

Sucuri Security

Sucuri Security

Adds file integrity monitoring, malware scanning, and security hardening that meet PCI DSS requirements for system integrity and intrusion detection.

  • File integrity monitoring
  • Malware scanning and removal tools
  • Security activity auditing
  • Post-hack remediation support

Journal d'activité WP

Journal d'activité WP

Documents administrative actions and user activity within WordPress and WooCommerce, supporting PCI DSS requirements around tracking access to network resources and cardholder data environments.

  • Detailed user and admin activity logging
  • WooCommerce event tracking
  • Role-based monitoring and alerts
  • Log retention management

Taking Control of Your Compliance Requirements

PCI compliance doesn't have to be overwhelming for a small eCommerce business. The most common mistake is assuming either the payment gateway or the hosting provider covers everything. Neither does. Compliance is shared across the gateway, the hosting environment, and the merchant's application choices.

A practical starting point:

  1. Confirm the merchant level and SAQ type with the payment processor or acquiring bank. This single conversation can clarify most of what applies to a specific situation.
  2. Audit the checkout flow. Understanding exactly where card data goes when a customer pays is foundational. If it never touches the server, the scope is narrow. If the site plays any role in passing that data along, its obligations expand.
  3. Review the hosting environment. Ask the current host whether they hold a documented PCI AOC, what security features are included, and what compliance responsibilities remain with the merchant. If those questions can't be answered clearly, that's a useful signal about the provider.
  4. Get quarterly ASV scans scheduled. This is one of the more commonly missed requirements for small stores, and one of the easier ones to address once the right host or vendor is in place.
  5. Complete the annual SAQ. The PCI Security Standards Council provides the forms at pcisecuritystandards.org. Payment processors often have resources to help identify the right version for a given setup.

Understanding what's required and acting on it consistently is what compliance actually looks like in practice.

Vous appréciez cet article ?
Partagez-le sur les réseaux sociaux !

Découvrez un autre article de blog !

Retour à tous les articles du blog
© Copyright 2024, Bright Hosting
chevron vers le bas flèche gauche flèche droite