{"id":3457,"date":"2022-11-11T07:30:50","date_gmt":"2022-11-11T06:30:50","guid":{"rendered":"http:\/\/10.24.225.70\/?p=3457"},"modified":"2026-03-24T18:38:04","modified_gmt":"2026-03-24T17:38:04","slug":"the-scoping-exercise-the-foundation-for-pci-dss-compliance","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/","title":{"rendered":"The scoping exercise: the foundation for PCI DSS compliance"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-1c95cc62 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-627ud4 is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns3457_064662-32\"><a class=\"kb-button kt-button button kb-btn3457_d75ac4-38 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\" href=\"https:\/\/complior.se\/en\/resources\/\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowLeft kt-btn-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"19\" y1=\"12\" x2=\"5\" y2=\"12\"\/><polyline points=\"12 19 5 12 12 5\"\/><\/svg><\/span><span class=\"kt-btn-inner-text\">Tillbaka till resurser<\/span><\/a><\/div>\n\n\n\n<span class=\"kt-adv-heading3457_40e943-0e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_40e943-0e\">Blog<\/span>\n\n\n\n<h1 class=\"kt-adv-heading3457_68bce4-c1 animated fadeIn wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_68bce4-c1\">The Scoping Exercise: The Foundation for PCI DSS Compliance<\/h1>\n\n\n\n<div class=\"wp-block-group animated fadeIn is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\"><div class=\"publish-date-container\">\r\n\t<svg\r\n\t\twidth=\"16\"\r\n\t\theight=\"16\"\r\n\t\tviewbox=\"0 0 24 24\"\r\n\t\tfill=\"none\"\r\n\t\tstroke=\"#4b4b4b\"\r\n\t\tstroke-width=\"2\"\r\n\t\tstroke-linecap=\"round\"\r\n\t\tstroke-linejoin=\"round\"\r\n\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\"\r\n\t\taria-hidden=\"true\"\r\n\t>\r\n\t\t<rect x=\"3\" y=\"4\" width=\"18\" height=\"18\" rx=\"2\" ry=\"2\"><\/rect>\r\n\t\t<line x1=\"16\" y1=\"2\" x2=\"16\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"8\" y1=\"2\" x2=\"8\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"3\" y1=\"10\" x2=\"21\" y2=\"10\"><\/line>\r\n\t<\/svg>\r\n\t<span class=\"date-text\">\r\n\t\tNov 11, 2022\t<\/span>\r\n<\/div>\n\n\n<h1 class=\"kt-adv-heading3457_ab5f95-73 wp-block-kadence-advancedheading kt-adv-heading-has-icon animated fadeIn delay-100ms\" data-kb-block=\"kb-adv-heading3457_ab5f95-73\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_clock kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 6 12 12 16 14\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">8 min <\/span><\/h1><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image3457_089c8b-c9\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1440\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/Foundation-02-edited-scaled.png\" alt=\"Woman putting a toy brick on top of another\" class=\"kb-img wp-image-80085\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/Foundation-02-edited-scaled.png 2560w, https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/Foundation-02-edited-300x169.png 300w, https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/Foundation-02-edited-1024x576.png 1024w, https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/Foundation-02-edited-768x432.png 768w, https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/Foundation-02-edited-1536x864.png 1536w, https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/Foundation-02-edited-2048x1152.png 2048w, https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/Foundation-02-edited-18x10.png 18w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2eeb7bfc alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-1r2w5eo is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading3457_47f1c2-10 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_47f1c2-10\">PCI DSS Scope Reduction \u2013 \u201cRequirement Zero\u201d<\/h2>\n\n\n\n<p class=\"kt-adv-heading3457_3a4b34-7b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_3a4b34-7b\">N\u00e4r du startar ett PCI DSS-complianceprojekt \u00e4r scoping det som vissa QSAs kallar f\u00f6r \u201crequirement zero\u201d. Ju mer komplexa processer och system du har f\u00f6r att lagra, \u00f6verf\u00f6ra eller behandla kortdata (CHD), desto sv\u00e5rare blir det att uppn\u00e5 och uppr\u00e4tth\u00e5lla compliance.<\/p>\n\n\n\n<p class=\"kt-adv-heading3457_42a01d-4f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_42a01d-4f\">Att minska PCI DSS-scope \u00e4r d\u00e4rf\u00f6r ett avg\u00f6rande m\u00e5l f\u00f6r alla organisationer, eftersom det i slut\u00e4ndan leder till (ibland dramatiskt) l\u00e4gre totala kostnader f\u00f6r compliance. Om ett system tas ur scope slipper du b\u00e5de kostnad och arbete kopplat till \u00e5terkommande aktiviteter (t.ex. patchning, s\u00e5rbarhetsskanningar) samt \u00e5rliga revisioner.<\/p>\n\n\n\n<p class=\"kt-adv-heading3457_b4381d-86 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_b4381d-86\">Ytterligare f\u00f6rdelar inkluderar enklare underh\u00e5ll av s\u00e4kerhetskontroller och minskad risk genom en mindre attackyta.<\/p>\n\n\n\n<p class=\"kt-adv-heading3457_9819f5-d7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_9819f5-d7\">Scope-reduktion \u00e4r d\u00e4rmed det viktigaste verktyget f\u00f6r att begr\u00e4nsa omfattningen av compliance-arbetet. Det rekommenderas starkt att organisationer implementerar en strategi f\u00f6r detta redan i b\u00f6rjan av projektet, eftersom scoping definierar gr\u00e4nsen d\u00e4r alla krav ska uppfyllas.<\/p>\n\n\n\n<p class=\"kt-adv-heading3457_3f0e02-6f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_3f0e02-6f\">Samtidigt kan scope-reduktion kr\u00e4va f\u00f6r\u00e4ndringar i b\u00e5de n\u00e4tverksarkitektur och aff\u00e4rsprocesser, vilket g\u00f6r det till en utmaning att genomf\u00f6ra utan att p\u00e5verka tj\u00e4nster eller skapa h\u00f6ga kostnader.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-oiuazq is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading3457_e998ad-07 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_e998ad-07\">Viktiga begrepp<\/h2>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-sas43k is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading3457_2a3eb2-ba wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_2a3eb2-ba\">Out-of-scope<\/h3>\n\n\n\n<p class=\"kt-adv-heading3457_086a80-cb wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_086a80-cb\">Ett system (eller en systemkomponent) anses vara out-of-scope endast n\u00e4r det \u00e4r helt isolerat fr\u00e5n CDE (Card Data Environment). Det inneb\u00e4r att \u00e4ven om systemet komprometteras ska det inte kunna p\u00e5verka s\u00e4kerheten i CDE.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-xnspq2 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading3457_b645cf-58 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_b645cf-58\">Connected systems<\/h3>\n\n\n\n<p class=\"kt-adv-heading3457_707a38-57 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_707a38-57\">CDE och alla anslutna system r\u00e4knas som in-scope. Ett anslutet system \u00e4r varje komponent som kommunicerar med n\u00e5gon del av CDE, oavsett syfte, protokoll eller vilken enhet som initierar kommunikationen.<\/p>\n\n\n\n<p class=\"kt-adv-heading3457_002fc8-9e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_002fc8-9e\">Ett system anses vara isolerat (och d\u00e4rmed out-of-scope) endast om det:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1swwle6 has-manrope-font-family\">\n<li>Inte kan kommunicera med CDE<\/li>\n\n\n\n<li>Har verifierats att det inte kan kompromettera CDE:s s\u00e4kerhet<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-oiuazq is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading3457_c54dfa-87 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_c54dfa-87\">Hur man verifierar att ett system \u00e4r out-of-scope<\/h2>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-xnspq2 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading3457_7796d4-78 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_7796d4-78\">Penetrationstestning och segmenteringskontroller<\/h3>\n\n\n\n<p class=\"kt-adv-heading3457_1ab5f8-37 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_1ab5f8-37\">Implementera en metodik f\u00f6r penetrationstestning och genomf\u00f6ra tester som bekr\u00e4ftar att segmentering fungerar korrekt.<\/p>\n\n\n\n<p class=\"kt-adv-heading3457_13cfe1-cd wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_13cfe1-cd\">PCI Council anger att segmenteringskontroller ska inkludera:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1caqda3 has-manrope-font-family\">\n<li>Host discovery<\/li>\n\n\n\n<li>Port scanning<\/li>\n\n\n\n<li>Verifiering att isolerade n\u00e4t inte har \u00e5tkomst till CDE<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-xnspq2 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading3457_0f18b7-d6 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_0f18b7-d6\">Riskbed\u00f6mning av exkluderade system<\/h3>\n\n\n\n<p class=\"kt-adv-heading3457_43740f-0b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_43740f-0b\">PCI DSS kr\u00e4ver \u00e4ven att organisationer:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-foge4m has-manrope-font-family\">\n<li>Genomf\u00f6r riskbed\u00f6mning av b\u00e5de anslutna och exkluderade system<\/li>\n\n\n\n<li>Verifierar att exkluderade system inte kan p\u00e5verka CDE<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading3457_e689bb-01 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_e689bb-01\">Om ett exkluderat system kan p\u00e5verka CDE vid kompromettering m\u00e5ste det inkluderas i scope.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-wxex5q is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading3457_25d0e8-15 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_25d0e8-15\">Metoder f\u00f6r att minska PCI DSS-scope<\/h2>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1ie9xdm is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading3457_9ee74c-c2 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_9ee74c-c2\">Remove (Eliminera)<\/h3>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-uc0mhb has-manrope-font-family\">\n<li>Skapa en uppdaterad CHD-fl\u00f6desdiagram<\/li>\n\n\n\n<li>Konsolidera system som hanterar CHD<\/li>\n\n\n\n<li>Eliminera redundant lagring och applikationer<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1ie9xdm is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading3457_302624-b8 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_302624-b8\">Truncate \/ Mask (Trunkering och maskning)<\/h3>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1pw932t has-manrope-font-family\">\n<li>Anv\u00e4nd endast delar av PAN d\u00e4r m\u00f6jligt<\/li>\n\n\n\n<li>Minskad datam\u00e4ngd minskar risk och kan ta system ur scope<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1ie9xdm is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading3457_927c7e-21 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_927c7e-21\">Hashing<\/h3>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1pw932t has-manrope-font-family\">\n<li>Ers\u00e4tt PAN med hashv\u00e4rden<\/li>\n\n\n\n<li>Anv\u00e4nd salt (random input) f\u00f6r att f\u00f6rhindra j\u00e4mf\u00f6relser mot f\u00f6rber\u00e4knade tabeller<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-3sld2r is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading3457_b36289-6b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_b36289-6b\">Tokenization<\/h3>\n\n\n\n<p class=\"kt-adv-heading3457_7d4464-9e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_7d4464-9e\">Tokenization ers\u00e4tter k\u00e4nslig data med tokens. F\u00f6rdelarna \u00e4r:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-8uxpap has-manrope-font-family\">\n<li>Mindre beroende av kryptering och nyckelhantering<\/li>\n\n\n\n<li>Skydd mot attacker som extraherar data fr\u00e5n minne<\/li>\n\n\n\n<li>M\u00f6jligg\u00f6r analys och databehandling via tokens<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading3457_fb53e2-fe wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_fb53e2-fe\">Nya l\u00f6sningar inkluderar:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-8uxpap has-manrope-font-family\">\n<li>Vault-less tokenization<\/li>\n\n\n\n<li>In-memory tokenization<\/li>\n\n\n\n<li>Tokenization as a Service (TaaS)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1328u9z is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading3457_bbdc13-b7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3457_bbdc13-b7\">Point-to-Point Encryption (P2PE)<\/h2>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1nyp6w9 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-8uxpap has-manrope-font-family\">\n<li>Krypterar data fr\u00e5n insamlingspunkt till s\u00e4ker endpoint<\/li>\n\n\n\n<li>Rekommenderad metod f\u00f6r handlare<\/li>\n\n\n\n<li>Begr\u00e4nsat antal validerade l\u00f6sningar (men v\u00e4xande)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The more complex your processes and systems for storing, transmitting or processing cardholder data are, the harder to maintain compliance<\/p>","protected":false},"author":2,"featured_media":73572,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"blogg","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":4,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[118],"tags":[117,127,128],"class_list":["post-3457","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogg","tag-blog","tag-pci","tag-pci-dss"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The scoping exercise: the foundation for PCI DSS compliance - Complior<\/title>\n<meta name=\"description\" content=\"The more complex your processes and systems for storing, transmitting or processing cardholder data are, the harder to maintain compliance\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The scoping exercise: the foundation for PCI DSS compliance - Complior\" \/>\n<meta property=\"og:description\" content=\"The more complex your processes and systems for storing, transmitting or processing cardholder data are, the harder to maintain compliance\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-11T06:30:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T17:38:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2022\/12\/Foundation-02-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kikki Bostrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kikki Bostrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\\\/\"},\"author\":{\"name\":\"Kikki Bostrom\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\"},\"headline\":\"The scoping exercise: the foundation for PCI DSS compliance\",\"datePublished\":\"2022-11-11T06:30:50+00:00\",\"dateModified\":\"2026-03-24T17:38:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\\\/\"},\"wordCount\":582,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Foundation-02-scaled.png\",\"keywords\":[\"Blog\",\"PCI\",\"PCI DSS\"],\"articleSection\":[\"Blogg\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\\\/\",\"name\":\"The scoping exercise: the foundation for PCI DSS compliance - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Foundation-02-scaled.png\",\"datePublished\":\"2022-11-11T06:30:50+00:00\",\"dateModified\":\"2026-03-24T17:38:04+00:00\",\"description\":\"The more complex your processes and systems for storing, transmitting or processing cardholder data are, the harder to maintain compliance\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Foundation-02-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Foundation-02-scaled.png\",\"width\":2560,\"height\":1340,\"caption\":\"Woman putting a toy brick on top of another\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The scoping exercise: the foundation for PCI DSS compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\",\"name\":\"Kikki Bostrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"caption\":\"Kikki Bostrom\"},\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/kikki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The scoping exercise: the foundation for PCI DSS compliance - Complior","description":"The more complex your processes and systems for storing, transmitting or processing cardholder data are, the harder to maintain compliance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/","og_locale":"en_GB","og_type":"article","og_title":"The scoping exercise: the foundation for PCI DSS compliance - Complior","og_description":"The more complex your processes and systems for storing, transmitting or processing cardholder data are, the harder to maintain compliance","og_url":"https:\/\/complior.se\/en\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/","og_site_name":"Complior","article_published_time":"2022-11-11T06:30:50+00:00","article_modified_time":"2026-03-24T17:38:04+00:00","og_image":[{"width":2560,"height":1340,"url":"https:\/\/complior.se\/wp-content\/uploads\/2022\/12\/Foundation-02-scaled.png","type":"image\/png"}],"author":"Kikki Bostrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kikki Bostrom","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/#article","isPartOf":{"@id":"https:\/\/complior.se\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/"},"author":{"name":"Kikki Bostrom","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016"},"headline":"The scoping exercise: the foundation for PCI DSS compliance","datePublished":"2022-11-11T06:30:50+00:00","dateModified":"2026-03-24T17:38:04+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/"},"wordCount":582,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2022\/12\/Foundation-02-scaled.png","keywords":["Blog","PCI","PCI DSS"],"articleSection":["Blogg"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/","url":"https:\/\/complior.se\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/","name":"The scoping exercise: the foundation for PCI DSS compliance - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2022\/12\/Foundation-02-scaled.png","datePublished":"2022-11-11T06:30:50+00:00","dateModified":"2026-03-24T17:38:04+00:00","description":"The more complex your processes and systems for storing, transmitting or processing cardholder data are, the harder to maintain compliance","breadcrumb":{"@id":"https:\/\/complior.se\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2022\/12\/Foundation-02-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2022\/12\/Foundation-02-scaled.png","width":2560,"height":1340,"caption":"Woman putting a toy brick on top of another"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/the-scoping-exercise-the-foundation-for-pci-dss-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"The scoping exercise: the foundation for PCI DSS compliance"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016","name":"Kikki Bostrom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","caption":"Kikki Bostrom"},"url":"https:\/\/complior.se\/en\/author\/kikki\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2022\/12\/Foundation-02-scaled.png",2560,1340,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2022\/12\/Foundation-02-150x150.png",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2022\/12\/Foundation-02-300x157.png",300,157,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2022\/12\/Foundation-02-768x402.png",768,402,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2022\/12\/Foundation-02-1024x536.png",1024,536,true],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2022\/12\/Foundation-02-1536x804.png",1536,804,true],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2022\/12\/Foundation-02-2048x1072.png",2048,1072,true],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2022\/12\/Foundation-02-18x9.png",18,9,true]},"uagb_author_info":{"display_name":"Kikki Bostrom","author_link":"https:\/\/complior.se\/en\/author\/kikki\/"},"uagb_comment_info":0,"uagb_excerpt":"The more complex your processes and systems for storing, transmitting or processing cardholder data are, the harder to maintain compliance","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/3457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=3457"}],"version-history":[{"count":5,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/3457\/revisions"}],"predecessor-version":[{"id":80090,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/3457\/revisions\/80090"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/73572"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=3457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=3457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=3457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}