Frequently Asked Question

How can I determine whether a QSA is authorized to perform PCI DSS assessments in all countries that are in scope for my company's PCI DSS assessment?
The Servicing Markets element of the Qualified Security Assessor (QSA) listing indicates the geographic regions or countries for which the QSA Company is authorized by PCI SSC to perform PCI DSS assessments and QSA-related duties. Under no circumstances may QSA Companies perform PCI DSS Assessments–or act as a QSA Company in any capacity–outside of the regions or countries for which they are qualified.
The Place of Business element of the QSA listing indicates the QSA Company has a physical presence in that country. This is provided for information only and does not supersede the Servicing Markets element of the listing.
If QSA-related tasks must be performed outside of the geographic regions or countries for which the QSA Company is qualified, it may be necessary to engage a QSA Company qualified for that region/country to perform the related tasks. Further information is available in the QSA Program Guide available on the PCI SSC website.
Questions about which countries are included in a particular region should be addressed to the QSA Program Manager via qsa@pcisecuritystandards.org.
The Place of Business element of the QSA listing indicates the QSA Company has a physical presence in that country. This is provided for information only and does not supersede the Servicing Markets element of the listing.
If QSA-related tasks must be performed outside of the geographic regions or countries for which the QSA Company is qualified, it may be necessary to engage a QSA Company qualified for that region/country to perform the related tasks. Further information is available in the QSA Program Guide available on the PCI SSC website.
Questions about which countries are included in a particular region should be addressed to the QSA Program Manager via qsa@pcisecuritystandards.org.
November 2019
Article Number: 1472
Related
-
What are the expectations for entities when assigning risk rankings to vulnerabilities and resolving or addressing those vulnerabilities?
-
Is phishing-resistant authentication alone acceptable as multi-factor authentication for PCI DSS Requirements 8.4.1 and 8.4.3?
-
Are passkeys synced across devices, implemented according to the FIDO2 requirements, acceptable for use as phishing-resistant authentication to meet PCI DSS Requirement 8.4.2?
Featured FAQ Articles
Featured
-
Do PCI DSS requirements for keyed cryptographic hashing apply to previously hashed PANs?
-
Is the PCI DSS Attestation of Compliance intended to be shared?
-
How does an entity report the results of a PCI DSS assessment for new requirements that are noted in PCI DSS as best practices until a future date?
-
Where do I direct questions about complying with PCI standards?
-
Can SAQ eligibility criteria be used as a guide for determining applicability of PCI DSS requirements for merchant assessments documented in a Report on Compliance?
Most Popular
-
What are the expectations for entities when assigning risk rankings to vulnerabilities and resolving or addressing those vulnerabilities?
-
Is phishing-resistant authentication alone acceptable as multi-factor authentication for PCI DSS Requirements 8.4.1 and 8.4.3?
-
Are passkeys synced across devices, implemented according to the FIDO2 requirements, acceptable for use as phishing-resistant authentication to meet PCI DSS Requirement 8.4.2?
-
How should PCI DSS v4.x requirements noted as superseded by another requirement be reported after 31 March 2025?
-
Are providers of third-party scripts for e-commerce environments considered third-party service providers for PCI DSS Requirements 12.8 and 12.9?
Most Recently Updated
-
What are the expectations for entities when assigning risk rankings to vulnerabilities and resolving or addressing those vulnerabilities?
-
Can SAQ eligibility criteria be used as a guide for determining applicability of PCI DSS requirements for merchant assessments documented in a Report on Compliance?
-
Is phishing-resistant authentication alone acceptable as multi-factor authentication for PCI DSS Requirements 8.4.1 and 8.4.3?
-
Are passkeys synced across devices, implemented according to the FIDO2 requirements, acceptable for use as phishing-resistant authentication to meet PCI DSS Requirement 8.4.2?
-
How should PCI DSS v4.x requirements noted as superseded by another requirement be reported after 31 March 2025?