PCI-DSS v4.0.1 for Hudson Valley Retailers and Restaurants: SAQ A vs. SAQ D and Why Your Processor Lied About Scope

Your payment processor said you were covered. They were wrong. Here is what PCI compliance actually requires of small merchants in 2026.

By Jim Venuto | February 3, 2026 | Hudson Valley CISO

The Phone Call Every Restaurant Owner Gets

A few months ago, the owner of a well-known farm-to-table restaurant in Rhinebeck called me after receiving a letter from their acquiring bank. The letter informed her that she needed to demonstrate PCI-DSS compliance or face a monthly non-compliance fee of $30. She was confused. Her payment processor had told her, verbatim, "You use our terminal, so you're PCI compliant." She had taken that at face value for three years.

She was not compliant. Not even close. The terminal itself was configured correctly, but the restaurant's WiFi network was flat — the same network serving guests also carried card transactions. There was no segmentation. The back-office PC that ran the point-of-sale reporting software had not been patched since 2023. Two employees shared a single login to the POS management portal. None of this was exotic negligence; it was the ordinary state of affairs for a small restaurant that trusted its processor to handle everything.

This story plays out constantly across the Hudson Valley. Retailers in Kingston, breweries in Beacon, boutiques in New Paltz, and diners in Poughkeepsie are all operating under the same misconception. The processor handles the terminal, therefore the processor handles compliance. That is not how PCI-DSS works, and version 4.0.1 has made the distinction sharper than ever.

Who PCI-DSS v4.0.1 Applies To (Yes, That Includes You)

PCI-DSS — the Payment Card Industry Data Security Standard — applies to every entity that stores, processes, or transmits cardholder data, and to every entity that can affect the security of cardholder data. That second clause is the one people miss. You do not need to touch a card number yourself. If your network, your devices, or your employees can influence the environment where card data flows, you are in scope.

Merchant levels determine how you validate compliance, not whether you must comply. The card brands define four levels based on annual transaction volume:

Merchant Level Annual Visa Transactions Validation Requirement
Level 1 Over 6 million Annual on-site assessment by a Qualified Security Assessor (QSA); quarterly network scans by an Approved Scanning Vendor (ASV)
Level 2 1 million to 6 million Annual Self-Assessment Questionnaire (SAQ); quarterly ASV scans
Level 3 20,000 to 1 million (e-commerce) Annual SAQ; quarterly ASV scans
Level 4 Fewer than 20,000 (e-commerce) or up to 1 million (all other) Annual SAQ; quarterly ASV scans recommended, may be required by acquirer

Almost every independent restaurant, retail shop, and small hospitality business in the Hudson Valley is a Level 4 merchant. That does not mean you get a pass. It means you validate with an SAQ instead of hiring an on-site assessor. You still have to meet the standard. Your acquiring bank can still demand evidence. And if a breach occurs, nobody will care that you were "only" Level 4.

The SAQ Selection Problem: A Through D

The Self-Assessment Questionnaire is not a single form. The PCI Council publishes multiple SAQ types, and the one you must complete depends on how you accept payments and how your environment is configured. Picking the wrong SAQ is one of the most common mistakes small merchants make, often because their processor pointed them to the shortest one.

SAQ A: The Narrow Path

SAQ A is designed for merchants who have fully outsourced all payment processing. In a card-present environment, this means you use a PCI-validated point-of-interaction (POI) device — a terminal — that connects directly to the processor over a dedicated cellular or Ethernet connection, and your business systems never touch, store, or transit cardholder data. For e-commerce, it means all payment pages are hosted entirely by a PCI-compliant third party (an iframe or redirect to Stripe, Square, or similar). SAQ A has roughly 30 questions. It is the lightest validation burden.

Here is the catch: to qualify for SAQ A in a card-present scenario under v4.0.1, your POI terminal must be on a network that is isolated from all other business systems, or the terminal must use its own cellular connection. The moment that terminal sits on the same network as your office PC, your inventory system, or your guest WiFi, you have failed the eligibility criteria for SAQ A.

SAQ B-IP: Terminals on IP Networks

SAQ B-IP covers merchants who use standalone, PTS-approved payment terminals connected to the processor via an IP network, but who do not store cardholder data electronically. This is where many restaurants actually land. Your terminal plugs into your router, the router provides internet access, and transactions flow over that connection. SAQ B-IP has around 80 questions and introduces requirements around network segmentation, access controls, and vulnerability management that SAQ A does not.

SAQ C: Payment Application Systems

SAQ C applies when you have a payment application system — a POS system running on a PC, tablet, or server — connected to the internet. If your checkout system is software-based rather than a standalone hardware terminal, you are likely here. SAQ C runs to about 160 questions and requires attention to application security, logging, and change management.

SAQ D: Everything Else

SAQ D is the full standard. Over 300 questions. It applies to any merchant who does not meet the criteria for SAQ A, B-IP, or C. If you store cardholder data electronically, if your environment is complex, or if you simply cannot prove eligibility for a shorter SAQ, SAQ D is your default. Many merchants end up here not because of deliberate design choices, but because nobody planned their network with PCI scope in mind.

The Practical Takeaway: If your payment terminal shares a network switch, router, or WiFi access point with any business system — a PC, a tablet used for ordering, an office laptop, a security camera DVR — you do not qualify for SAQ A. Most Hudson Valley restaurants running a single flat network with a terminal plugged into the same router as everything else are looking at SAQ B-IP at minimum, and possibly SAQ C or D depending on their POS setup.

Why Scope Is Bigger Than You Think

PCI scope is determined by connectivity, not intention. Your guest WiFi network, the one you set up so diners could browse while they waited for their entrees, is in scope if it shares any infrastructure with the network that carries card transactions. Your back-office PC running QuickBooks is in scope if it is on the same subnet as the terminal. The security cameras streaming to a cloud DVR are in scope if they share a switch with payment devices. The employee who logs into the POS portal from their personal phone over the restaurant WiFi has just brought that phone into scope.

This is not a theoretical concern. When a breach investigation begins, the forensic examiner maps the entire network. Every device on every segment that was not provably isolated from the cardholder data environment is treated as compromised until proven otherwise. The investigation costs scale with scope. A flat network means the entire network is in scope, and the forensic bill reflects it.

Network segmentation is the single most effective step a small merchant can take to reduce PCI scope. A properly segmented network places the payment terminal on its own VLAN or dedicated connection, isolated by firewall rules from all other traffic. This is not expensive. A managed switch that supports VLANs costs under $150. A competent IT provider can configure it in an afternoon. But it has to be done deliberately, documented, and tested. "We plugged the terminal into a different port on the same consumer-grade router" is not segmentation.

What Changed in PCI-DSS v4.0: The Requirements That Bite

PCI-DSS v4.0 (with its 4.0.1 revision clarifying certain language) replaced version 3.2.1 as the sole active standard on March 31, 2024. Several of the new requirements have extended deadlines, with the final batch becoming mandatory on March 31, 2025. If you have not started preparing, you are already behind.

Targeted Risk Analysis

Version 4.0 introduces the concept of targeted risk analysis for certain requirements. Where v3.2.1 prescribed specific frequencies for activities like log reviews and vulnerability scans, v4.0 allows organizations to set their own frequencies — but only if they perform a documented risk analysis justifying the chosen interval. For a small restaurant, this is a double-edged provision. You gain flexibility, but you also gain the obligation to document your reasoning. "We review logs when we feel like it" does not satisfy a targeted risk analysis.

The Customized Approach

Version 4.0 offers a "customized approach" as an alternative to the traditional "defined approach" for meeting certain requirements. The customized approach lets you implement a control that differs from the prescriptive requirement, provided you can demonstrate it meets the stated security objective. In practice, this is designed for large, sophisticated organizations with mature security programs. A five-table bistro in Cold Spring should stick with the defined approach. The customized approach requires rigorous documentation and is evaluated more intensively during assessments.

Multi-Factor Authentication

Requirement 8.4.2 now mandates multi-factor authentication (MFA) for all access into the cardholder data environment, not just remote access. If an employee logs into the POS management console, that login needs MFA. If an IT provider accesses the terminal configuration remotely, that session needs MFA. This is a significant change for small merchants who previously relied on a single shared password taped to the register.

Anti-Phishing Controls

Requirement 5.4.1 requires mechanisms to detect and protect personnel against phishing attacks. For small merchants, this typically means a combination of email filtering, security awareness training, and technical controls like DMARC on your domain. The standard does not specify a particular product; it specifies an outcome. Your staff must be trained to recognize phishing, and you must have something in place beyond hope to prevent it from succeeding.

Authenticated Vulnerability Scanning

Internal vulnerability scans under Requirement 11.3.1.2 must now be performed with authenticated credentials, meaning the scanner logs into systems rather than just probing them from the outside. This produces more accurate results but requires more setup. If you outsource scanning to a managed security provider, confirm they are performing authenticated scans, not just running a surface-level port sweep.

Building Your Evidence Pack

Compliance is not a state of mind; it is a pile of documents. When your acquiring bank, a card brand, or a forensic investigator asks for proof, you need to produce it. The following table outlines the evidence a Level 4 merchant should maintain, organized by category.

Evidence Item Description Frequency Responsible Party
Completed SAQ The correct SAQ type for your environment (A, B-IP, C, or D), fully completed and signed by an officer of the business Annually Business owner or designated compliance contact
Attestation of Compliance (AOC) The formal attestation document that accompanies the SAQ, confirming compliance status Annually Business owner
Network Diagram A diagram showing all network segments, devices, and data flows, with clear identification of the cardholder data environment and any segmentation controls Annually and upon any network change IT provider or internal IT
ASV Scan Reports Quarterly external vulnerability scan results from a PCI-approved Approved Scanning Vendor, showing a passing status Quarterly ASV vendor
Internal Vulnerability Scan Reports Authenticated internal vulnerability scan results showing identified vulnerabilities and remediation actions Quarterly (or per targeted risk analysis) IT provider or managed security service
Employee Security Training Records Documentation that all personnel with access to the cardholder data environment have completed security awareness training, including anti-phishing training Upon hire and annually Business owner or HR
MFA Configuration Evidence Screenshots or configuration exports demonstrating MFA is enabled for all access to the cardholder data environment Annually and upon system changes IT provider
Firewall and Segmentation Rules Documented firewall rulesets and VLAN configurations proving that the payment network is isolated from other business systems Annually and upon changes IT provider
Incident Response Plan A written plan describing how the business will detect, respond to, and recover from a security incident involving cardholder data Annually reviewed Business owner with IT provider input
Targeted Risk Analysis Documentation Written risk analysis justifying any frequency or approach decisions made under v4.0 flexibility provisions Annually or when the risk environment changes Business owner with IT provider input

Keep this evidence in a single folder — physical or digital — that you can produce on demand. If you use a digital folder, make sure it is not stored on a system within the cardholder data environment. A shared drive outside the payment network, or a cloud storage account with MFA, works well.

What a Breach Actually Costs a Small Merchant

The financial consequences of a card data breach for a small merchant are severe and immediate, and they extend well beyond the obvious.

Forensic Investigation

When a breach is suspected, your acquiring bank will require a forensic investigation by a PCI Forensic Investigator (PFI). You do not get to choose whether this happens. The cost for a small merchant typically ranges from $20,000 to $50,000, depending on the complexity of the environment. Remember the scope discussion above: a flat, unsegmented network means the investigator must examine every device on the network. Segmentation limits the investigation scope and the bill.

Card Brand Fines and Assessments

Visa, Mastercard, and the other card brands impose fines on acquiring banks, which pass those fines to you via your merchant agreement. These typically range from $5,000 to $100,000 per month of non-compliance. Read the fine print in your merchant services agreement. There is almost certainly a clause that makes you responsible for these assessments.

Liability Shift

If the investigation determines you were not PCI compliant at the time of the breach, you bear liability for fraudulent transactions on the compromised cards. For a restaurant processing 200 transactions per day over a compromise window of 90 days, the fraud exposure can reach six figures quickly. Your processor's agreement almost certainly contains an indemnification clause that shifts this liability to you.

Operational Disruption

During the investigation, you may be required to suspend card processing or migrate to a new, validated environment. For a restaurant or retailer that depends on card payments for the vast majority of revenue, even a few days of disruption can be devastating. Factor in the cost of emergency IT services, new equipment, and lost sales.

Reputational Damage

In the Hudson Valley, word travels fast. A data breach at a local business becomes a topic of conversation at every farmers market and community board meeting. The trust you have built with your customers is difficult to rebuild, and for a small business without a corporate marketing department, the reputational impact can linger for years.

A Note on Insurance: Cyber liability insurance can help cover forensic costs and some liabilities, but most policies require you to demonstrate that you were meeting baseline security standards — including PCI-DSS — at the time of the incident. If the insurer determines you were non-compliant, they may deny the claim. Insurance is not a substitute for compliance; it is a complement to it.

A Practical Path Forward

If you are a Hudson Valley retailer or restaurant owner reading this and realizing you have work to do, here is a sensible order of operations. None of these steps are extravagant. All of them are achievable for a small business without an IT department.

First, determine your correct SAQ type. Call your payment processor and ask specifically whether your terminal connects over a dedicated cellular connection or over your business IP network. Ask whether your POS system is a standalone terminal or a software application. Then compare the answers to the SAQ eligibility criteria published by the PCI Council. Do not accept "you're fine" as an answer. Get specifics.

Second, segment your network. If your payment terminal is on the same network as your office computer, your security cameras, or your guest WiFi, fix that before you do anything else. A managed switch with VLAN support and a basic firewall or router that can enforce inter-VLAN access rules will get you there. If you use a local IT provider, ask them specifically to create a dedicated payment VLAN with no routing to other segments except what is needed for the terminal to reach the processor.

Third, enable MFA everywhere it applies. Your POS management portal, your processor's merchant dashboard, your router's admin interface, and any remote access tools should all require a second factor. Most of these platforms support MFA natively. Turn it on. Use an authenticator app, not SMS, where possible.

Fourth, train your staff. Security awareness training does not need to be expensive or elaborate. A 30-minute annual session covering phishing recognition, password hygiene, and procedures for handling suspicious activity satisfies the requirement. Document who attended and when.

Fifth, schedule your scans. Engage an Approved Scanning Vendor for quarterly external scans. Many ASVs offer affordable plans for small merchants. For internal scans, your IT provider can run authenticated vulnerability scans using commercial or open-source tools. The results need to be documented and any critical or high-severity findings remediated promptly.

Sixth, assemble your evidence pack using the table above as a checklist. Complete your SAQ honestly. Sign your AOC. File everything in a folder you can access when your bank asks for it.

PCI compliance does not have to be overwhelming, but it does have to be real. If you are a Hudson Valley business owner who needs help determining your correct SAQ type, segmenting your network, or building an evidence pack, reach out through hudsonvalleyciso.com. A short conversation now is far less expensive than a forensic investigation later.

References

PCI Security Standards Council
PCI SSC Document Library — SAQ Forms, PCI-DSS v4.0.1, and Supporting Guidance