{"id":63644,"date":"2026-02-11T08:25:41","date_gmt":"2026-02-11T07:25:41","guid":{"rendered":"https:\/\/www.usd.de\/?page_id=63644"},"modified":"2026-02-12T15:08:14","modified_gmt":"2026-02-12T14:08:14","slug":"pci-audit","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/pci-payment-security\/pci-audit\/","title":{"rendered":"PCI Audit"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||0px||true|false\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-pci-header-4.0.jpg\" custom_margin=\"-25px||0px||false|false\" custom_padding=\"95px||60px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center;line-height: 120%;font-weight: 400\">PCI Audit<\/h1>\n<p style=\"text-align: center;line-height: 130%\">From Audit Expertise to Traceable Compliance.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||3%||false|false\" custom_padding=\"40px||0px||false|\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" custom_padding=\"||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>PCI audits are crucial for the security of your payment data and systems. We don\u2019t just check compliance with PCI standards (DSS, SSF, P2PE, PIN, 3DS), but also analyze your payment environment with technical depth. In doing so, we highlight risks in your payment environment, make connections transparent and give you clear, actionable recommendations. With over 20 years of audit and security experience, we deliver reliable results that offer more than just compliance: well-founded decisions, more security and strengthened trust.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"9px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>usd AG Audits According to All Relevant PCI Standards<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_5,1_5,1_5,1_5,1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" min_height=\"172.8px\" custom_margin=\"||5%||false|false\" custom_padding=\"||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/pci-dss-standard-beratung.svg\" alt=\"PCI Zertifizierungsprozess Kick-off\" title_text=\"pci-dss-standard-beratung\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" width=\"45%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><span style=\"color: #00a2b6\">Data Security Standard<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/pci-ssf-standard-beratung.svg\" alt=\"PCI Zertifizierungsprozess Kick-off\" title_text=\"pci-ssf-standard-beratung\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" width=\"45%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><span style=\"color: #00a2b6\">Software Security Framework<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/pci-3ds-standard-beratung.svg\" alt=\"PCI Zertifizierungsprozess Kick-off\" title_text=\"pci-3ds-standard-beratung\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" width=\"45%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><span style=\"color: #00a2b6\">3DS Core Security Standard<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/pci-p2pe-standard-beratung.svg\" alt=\"PCI Zertifizierungsprozess Kick-off\" title_text=\"pci-p2pe-standard-beratung\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" width=\"45%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><span style=\"color: #00a2b6\">Point-to-Point Encryption Standard<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/pci-pin-standard-beratung.svg\" alt=\"PCI Zertifizierungsprozess Kick-off\" title_text=\"pci-pin-standard-beratung\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" width=\"45%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><span style=\"color: #00a2b6\">PIN Security Standard<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" custom_padding=\"3%||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" custom_padding=\"0px||3%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Customers Who Already Trust Us<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"17px||4%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/NTT-Data.png\" alt=\"usd ag more security: Die usd AG sch\u00fctzt Unternehmen vor Hackern und Kriminellen\" title_text=\"NTT Data\" _builder_version=\"4.27.5\" _module_preset=\"default\" width=\"80%\" custom_margin=\"|0px||0px|false|false\" custom_padding=\"|0px||0px|false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p>\"We are pleased that with our successful certification according to PCI DSS, we have once again received confirmation this year that we fully comply with the security requirements of PCI DSS in our data centers. Many thanks to the team of auditors at usd AG for the competent advice and the cooperative partnership.\"<\/p>\n<p><strong>Sebastian Einicke, Vice President, Global Governance, Risk &amp; Compliance bei NTT Global Data Centers <\/strong><a href=\"https:\/\/www.usd.de\/ntt-global-data-centers-emea-nach-pci-dss-v4-0-zertifiziert\/\">(To the Customer Story)<\/a><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/category\/customer-stories\/\" url_new_window=\"on\" button_text=\"Read more Customer Stories\" _builder_version=\"4.27.5\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" custom_margin=\"5%||||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"2%||||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"9px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>From the Annual PCI Audit to the International Audit Program<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"||5%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>If your company has to cover several standards, countries, or payment landscapes, an audit program that coordinates across the board, bundles processes and makes complexity manageable is crucial:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.0\" _module_preset=\"default\" custom_padding=\"13px||80px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.0\" _module_preset=\"default\" border_color_all=\"#F07F1D\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_testimonial portrait_url=\"https:\/\/www.usd.de\/wp-content\/uploads\/Torsten-Schlotmann_rund-1.png\" quote_icon_color=\"#F07F1D\" quote_icon_background_color=\"#FFFFFF\" font_icon=\"&#xe06a;||divi||400\" portrait_width=\"150px\" portrait_height=\"150px\" use_icon_font_size=\"on\" icon_font_size=\"35px\" _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" custom_padding=\"3%||0px||false|false\" animation_style=\"fade\" border_width_all=\"2px\" border_color_all=\"#F07F1D\" border_radii_portrait=\"on|100%|100%|100%|100%\" border_color_all_portrait=\"RGBA(255,255,255,0)\" box_shadow_style_image=\"preset4\" box_shadow_horizontal_image=\"0px\" box_shadow_vertical_image=\"0px\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span style=\"font-size: 16px;font-weight: 300\">Many companies today not only have to meet one standard, but also have to prove and permanently comply with numerous regulatory requirements worldwide. This is exactly where we provide support: We identify synergies, create clear structures and control complex testing processes with experience and reliable orientation.<\/span><\/p>\n<p>Torsten Schlotmann, Principal usd Security Audits &amp; PCI<\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"||0px||false|false\" custom_padding=\"9px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Why usd AG Is Your First Choice for PCI Audits<\/h2>\n<p>[\/et_pb_text][et_pb_slider show_content_on_mobile=\"off\" disabled_on=\"off|off|off\" _builder_version=\"4.27.5\" _module_preset=\"default\" body_text_align=\"center\" background_color=\"RGBA(0,0,0,0)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/Slider-PCI-Beratung_BG.jpg\" background_size=\"contain\" custom_padding=\"60px||60px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 155%;font-weight: 400;line-height: 140%;text-align: left\">Experience in Complex PCI Environments<\/h3>\n<h3 style=\"color: white;font-size: 125%;font-weight: 300;line-height: 125%;text-align: left\">Over 20 years of international audit experience with<br \/>\ncompanies of all sizes and in a wide range of industries<br \/>\n\u2013 from retail to highly regulated financial service<br \/>\nproviders. For audits that provide orientation.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 155%;font-weight: 400;line-height: 140%;text-align: left\">Clarity Instead of Complexity<\/h3>\n<h3 style=\"color: white;font-size: 125%;font-weight: 300;line-height: 125%;text-align: left\">Multiple audits, international requirements, and different<br \/>\nstandards. We create transparency in complex PCI<br \/>\nlandscapes and control the entire process efficiently<br \/>\nand comprehensibly. For compliance that is feasible.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 155%;font-weight: 400;line-height: 140%;text-align: left\">Partnership Instead of Control<\/h3>\n<h3 style=\"color: white;font-size: 125%;font-weight: 300;line-height: 125%;text-align: left\">We guide you reliably through the entire audit process<br \/>\nand, if necessary, support you beyond that.<br \/>\nFor a partnership built on trust.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 155%;font-weight: 400;line-height: 140%;text-align: left\">Technology Meets Expertise<\/h3>\n<h3 style=\"color: white;font-size: 125%;font-weight: 300;line-height: 125%;text-align: left\">Modern tooling and AI combined with in-depth<br \/>\ncyber security know-how. For efficiency and reliable<br \/>\nquality that makes the difference.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 155%;font-weight: 400;line-height: 140%;text-align: left\">Future-Proof Compliance<\/h3>\n<h3 style=\"color: white;font-size: 125%;font-weight: 300;line-height: 125%;text-align: left\">We think beyond the audit: We create structures<br \/>\nfor sustainable compliance and efficient<br \/>\nsecurity processes. For stability that lasts.<\/h3>\n<p>[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|on\" _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"||0px||false|false\" custom_padding=\"9px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Why usd AG Is Your First Choice for PCI Audits<\/h2>\n<p>[\/et_pb_text][et_pb_slider _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" custom_padding=\"69px||69px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Erfahrung in komplexen PCI-Umgebungen<\/h3>\n<p>\u00dcber 20 Jahre internationale Audit-Erfahrung bei Unternehmen jeder Gr\u00f6\u00dfe und in unterschiedlichsten Branchen \u2013 vom Handel bis zu hochregulierten Finanzdienstleistern. F\u00fcr Audits, die Orientierung geben.[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Clarity Instead of Complexity<\/h3>\n<p>Multiple audits, international requirements, and different standards. We create transparency in complex PCI landscapes and control the entire process efficiently and comprehensibly. For compliance that is feasible.<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Partnership Instead of Control<\/h3>\n<p>We guide you reliably through the entire audit process and, if necessary, support you beyond that. For a partnership built on trust.[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Technology Meets Expertise<\/h3>\n<p>Modern tooling and AI combined with in-depth cyber security know-how. For efficiency and reliable quality that makes the difference.[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Future-Proof Compliance<\/h3>\n<p>We think beyond the audit: We create structures for sustainable compliance and efficient security processes. For stability that lasts.[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" custom_padding=\"65px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"0px||12px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>How usd AG Proceeds with PCI Audits<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"||0px||false|false\" custom_padding=\"9px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Our PCI auditors conduct audits according to the official requirements of the PCI Security Standards Council (PCI SSC). In doing so, we follow a clearly structured process model that is based on the respective PCI standards, but takes particular account of your individual framework conditions.<\/p>\n<p>If you need to comply with several PCI standards at the same time, we are happy to carry out the audits in combination. In this way, we avoid redundant inspection steps and reduce your effort.<\/p>\n<p>If you are developing payment software, you can find more information about our PCI SSF audits on our <a href=\"https:\/\/www.usd.de\/en\/pci-payment-security\/software-security-framework\/\">PCI SSF page<\/a> and further down the page. Below is our procedure for audits according to PCI DSS, PCI 3DS, PCI P2PE and PCI PIN.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/pci-zertifizierungsprozess-kick-off.svg\" alt=\"PCI Zertifizierungsprozess Kick-off\" title_text=\"pci-zertifizierungsprozess-kick-off\" align=\"center\" _builder_version=\"4.27.5\" _module_preset=\"default\" width=\"55%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Kick-Off<\/strong><\/p>\n<p>Every audit starts with a kick-off. Together with those responsible in your company, we coordinate the process, the schedule and the final scope and clarify all organizational framework conditions. In this way, we create a clear basis for the audit.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_text][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"20px|20px|20px|20px|false|false\" border_width_all=\"2px\" border_color_all=\"#F07F1D\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h4><span style=\"color: #ff9900\">Our Tips<\/span><\/h4>\n<p><strong><\/strong><\/p>\n<p><strong>Scope Workshop<\/strong><\/p>\n<p>Are you looking at PCI standards for the first time or planning major changes to your PCI environment? Then we recommend our Scope Workshop. Here we define the exact scope of testing together and discuss possible reduction in effort (e.g. through targeted scope reduction).<\/p>\n<p><strong>Gap Analysis<\/strong><\/p>\n<p>Do you want to start the audit well prepared, have made major changes in your PCI environment, or has a new release of the PCI standards been published? With our gap analysis, we check your environment for compliance and create a catalog of measures that we discuss together. On request, we can supplement the preparation with security analyses such as penetration tests, scans or training.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/pci-zertifizierungsprozess-zertifizierung.svg\" alt=\"PCI Zertifizierungsprozess Zertifizierung\" title_text=\"pci-zertifizierungsprozess-zertifizierung\" align=\"center\" _builder_version=\"4.27.5\" _module_preset=\"default\" width=\"55%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Audit Execution<\/strong><\/p>\n<p>As part of the audit, we specifically check your processes, applications, systems and infrastructure for compliance with the respective PCI standards. The implementation can be carried out on-site, remotely or combined \u2013 depending on the scope and the respective requirements and always in accordance with the specifications of the PCI SSC.<\/p>\n<p>We clearly explain any deviations that have been identified and give concrete, practical recommendations for remedying them. After their implementation, we test the measures in re-tests.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/pci-zertifizierungsprozess-siegel-zertifikat.svg\" alt=\"PCI Zertifizierungsprozess Siegel &amp; Zertifikat\" title_text=\"pci-zertifizierungsprozess-siegel-zertifikat\" align=\"center\" _builder_version=\"4.27.5\" _module_preset=\"default\" width=\"55%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Report<\/strong><\/p>\n<p>To prove compliance, our PCI auditors then prepare the official audit reports in accordance with the requirements of the respective PCI standard. After successful confirmation, you will receive your PCI certificate and the corresponding seal.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||70px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/epi-security-evaluator-unabhaengigkeit.svg\" alt=\"PCI Zertifizierungsprozess Vorbereitung\" title_text=\"epi-security-evaluator-unabhaengigkeit\" align=\"center\" _builder_version=\"4.27.5\" _module_preset=\"default\" width=\"55%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Continuous Complianc<\/strong><\/p>\n<p>Compliance is a continuous process that we shape together with you. We support you in meeting the PCI requirements permanently and sustainably, e.g. in the event of changes in standards or your IT infrastructure.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" custom_padding_last_edited=\"on|desktop\" _builder_version=\"4.27.2\" _module_preset=\"default\" custom_padding=\"4%||24px||false|false\" custom_padding_tablet=\"4%||24px||false|false\" custom_padding_phone=\"4%||24px||false|false\" border_width_all=\"2px\" border_color_all=\"#00a2b6\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/security-analysis-pentest-grafik-tipp.svg\" title_text=\"security-analysis-pentest-grafik-tipp\" align=\"center\" align_tablet=\"center\" align_phone=\"center\" align_last_edited=\"on|phone\" _builder_version=\"4.27.5\" _module_preset=\"default\" width=\"75%\" width_tablet=\"25%\" width_phone=\"40%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" custom_margin=\"0px|||20%|false|false\" custom_margin_tablet=\"0px|||0px|false|false\" custom_margin_phone=\"4%|||30%|false|false\" custom_margin_last_edited=\"on|phone\" custom_padding=\"||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin_tablet=\"\" custom_margin_phone=\"|8%|0%|8%|false|false\" custom_margin_last_edited=\"on|phone\" custom_padding_tablet=\"\" custom_padding_phone=\"1%||4%||false|false\" custom_padding_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3><span style=\"color: #f07f1d\">Notice to Software Vendors<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"|3%|3%||false|false\" custom_margin_tablet=\"|3%|3%||false|false\" custom_margin_phone=\"|3%|3%|1%|false|false\" custom_margin_last_edited=\"on|phone\" custom_padding=\"|3%|||false|false\" custom_padding_tablet=\"|3%|||false|false\" custom_padding_phone=\"|8%||8%|false|false\" custom_padding_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]The PCI Software Security Framework (PCI SSF) applies to payment software vendors. It combines several programs and security standards, making it structurally different from the other PCI standards. The detailed process of our PCI SSF audits can be found on our\u00a0PCI SSF page<\/a>.[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pci-payment-security\/software-security-framework\/\" button_text=\"To PCI SSF\" _builder_version=\"4.27.5\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"10px||||false|false\" custom_padding=\"75px||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Beyond the PCI Audit: How Does usd AG Support You with Your PCI Compliance?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px|auto||auto|false|false\" custom_padding=\"35px||2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-pci-security-services-kachel-beratung.jpeg\" alt=\"PCI Beratung\" title_text=\"usd-pci-security-services-kachel-beratung\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>PCI Consulting<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>No matter where you are: Our PCI auditors accompany you from planning to successful PCI compliance.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pci-payment-security\/pci-consulting\/\" button_text=\"To PCI Consulting\" _builder_version=\"4.27.5\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" custom_margin=\"4%||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%||||false|false\" custom_padding=\"35px||2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-8px||||false|false\" custom_padding=\"35px||2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Security Analyses for PCI<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Our experienced security analysts provide you with targeted support in all required testing measures \u2013 from security scans to pentests.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pci-payment-security\/security-analysis-for-pci-dss\/\" button_text=\"To Security Analysis\" _builder_version=\"4.27.5\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" custom_margin=\"4%||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-pci-security-services-kachel-pci-pentest.jpg\" title_text=\"usd-pci-security-services-kachel-pci-pentest\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%||||false|false\" custom_padding=\"35px||2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px|auto||auto|false|false\" custom_padding=\"35px||2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-pci-security-services-kachel-pci-experten.jpg\" title_text=\"usd-pci-security-services-kachel-pci-experten\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Our PCI-Auditor<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p>Our team of around 40 PCI auditors brings experience from numerous projects and industries. Get to know us.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pci-payment-security\/our-pci-auditors\/\" button_text=\"Our strengths in detail\" _builder_version=\"4.27.5\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" custom_margin=\"4%||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"10%||||false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"9px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>PCI DSS and PCI SSF: What You Need to Know<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px|auto||auto|false|false\" custom_padding=\"35px||2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/PCI-Seminare-Kachel-1-1.jpeg\" alt=\"PCI Beratung\" title_text=\"Online shopping\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>PCI DSS Deep Dive<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>PCI DSS is the most well-known security standard for the protection of credit card data. Learn more about requirements and answers to common questions.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pci-payment-security\/pci-dss\/\" button_text=\"To PCI DSS Deep Dive\" _builder_version=\"4.27.5\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" custom_margin=\"4%||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%||||false|false\" custom_padding=\"35px||2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"-8px||||false|false\" custom_padding=\"35px||35px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>PCI SSF Deep Dive<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>The standards of the PCI Software Security Framework (PCI SSF) define binding security requirements for payment software and define the central requirements for the protection of sensitive data. You can find out more about requirements and benefits here.<br \/><span><span><!--ScriptorEndFragment--><\/span><\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pci-payment-security\/software-security-framework\/\" button_text=\"To PCI SSF Deep Dive\" _builder_version=\"4.27.5\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" custom_margin=\"4%||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ssf-kachel.jpeg\" title_text=\"usd-ssf-kachel\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PCI Audit From Audit Expertise to Traceable Compliance.PCI audits are crucial for the security of your payment data and systems. We don\u2019t just check compliance with PCI standards (DSS, SSF, P2PE, PIN, 3DS), but also analyze your payment environment with technical depth. In doing so, we highlight risks in your payment environment, make connections transparent [&hellip;]<\/p>\n","protected":false},"author":112,"featured_media":24220,"parent":11673,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-63644","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/63644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=63644"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/63644\/revisions"}],"predecessor-version":[{"id":64081,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/63644\/revisions\/64081"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11673"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/24220"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=63644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}