← Back to Blog

PCI-DSS SAQ Guide: Which Self-Assessment Questionnaire Do You Need?

When PCI SSC published updated SAQ A eligibility criteria alongside PCI DSS v4.0.1, it quietly disqualified a significant chunk of e-commerce merchants who'd been using the simplest self-assessment form for years. The issue wasn't that they were doing anything wrong with card data — it's that any JavaScript loading on their checkout page, including analytics trackers and chat widgets, could technically affect payment transaction security. That makes SAQ A-EP the right form, not SAQ A.

This isn't a technicality. SAQ A has roughly 22 requirements. SAQ A-EP has roughly 191 — including the new script integrity monitoring requirements (6.4.3 and 11.6.1) that specifically target the Magecart-style e-skimming attacks that have been targeting checkout pages since 2022. If you're on the wrong SAQ, you're certifying compliance against the wrong controls.

Here's how to pick the right one.

The short version: a decision tree

Before getting into each SAQ type, here's the logic that determines which one applies to you.

1
Do you process more than 6 million card transactions per year (Visa/Mastercard)?
✓ Yes → You're Level 1. You need a full QSA audit (Report on Compliance), not an SAQ.
→ No → Continue to step 2.
2
Do you store cardholder data (primary account numbers) electronically?
✓ Yes → SAQ D (Merchant). All 12 PCI DSS requirements apply.
→ No → Continue to step 3.
3
Do you use only card-present terminals (no e-commerce) with no internet connectivity on the terminal?
✓ Yes → SAQ B (dial-out terminals) or SAQ B-IP (if the terminal is IP-connected).
→ No → Continue to step 4.
4
Do you use a validated Point-to-Point Encryption (P2PE) solution?
✓ Yes → SAQ P2PE, provided you've implemented the solution per the vendor's P2PE Instruction Manual.
→ No → Continue to step 5.
5
Is your payment processing fully outsourced to a PCI DSS-compliant third party, with the payment form entirely hosted on their domain — and can your site confirm it's not susceptible to script attacks that could affect the payment system?
✓ Yes (fully hosted + confirmed script safety) → SAQ A.
→ Partially (your site loads any JavaScript that could affect checkout) → SAQ A-EP.
6
Do you have an internet-connected payment application that processes card data but doesn't store it?
✓ Yes → SAQ C.
→ Everything else → SAQ D (Merchant).

SAQ A — the shortest form, with stricter eligibility than you think

SAQ A is for merchants who fully outsource all card processing to a PCI DSS-compliant third party. In the v4.0.1 version published in early 2025, it carries about 22 requirements — the smallest of any SAQ type.

To qualify, every single one of these must be true:

  • Your business accepts only e-commerce or mail order/telephone order (MOTO) payments — no card-present transactions
  • All payment processing is handled by a PCI DSS-compliant third-party service provider
  • Your systems do not store, process, or transmit any cardholder data electronically
  • The payment form is entirely hosted on the third-party's domain — customers enter card data on a page you don't serve
  • Your site is confirmed not susceptible to attacks from scripts that could affect your e-commerce systems

That last bullet is the v4.0.1 addition. PCI SSC removed Requirements 6.4.3 and 11.6.1 from the SAQ A form itself — but added a new eligibility confirmation requirement that merchants must verify their site is protected from script attacks. You can meet this by either implementing the techniques described in Requirements 6.4.3 and 11.6.1, or by obtaining written confirmation from your payment processor that their embedded solution already does this.

STRIPE CHECKOUT vs STRIPE ELEMENTS

This distinction matters constantly for merchants using Stripe. Stripe's hosted Checkout (customers redirected to checkout.stripe.com) typically qualifies for SAQ A — Stripe handles everything on their domain. Stripe Elements, where card input fields are embedded on your page via iframes, puts payment processing on your domain's page. Whether that qualifies for SAQ A or SAQ A-EP depends on whether any of your site's JavaScript can influence the payment form. When in doubt, ask Stripe directly — they can confirm what SAQ they recommend for your specific integration.

SAQ A-EP — for e-commerce merchants in the gray zone

SAQ A-EP applies when you sell online, redirect customers to a third-party processor for actual card data entry, but your website can influence the payment transaction in any way. "Influence" is the operative word — if your pages load JavaScript that runs on the same origin as the payment form, or if your server generates any part of the checkout flow, SAQ A-EP almost certainly applies.

SAQ A-EP has roughly 191 requirements in v4.0.1, and it includes both Requirements 6.4.3 and 11.6.1:

  • Requirement 6.4.3: Maintain an inventory of all scripts on payment pages, document the business justification for each, and implement integrity checks (via Subresource Integrity hashes or behavior monitoring)
  • Requirement 11.6.1: Implement a tamper-detection mechanism that alerts on unauthorized changes to HTTP headers and scripts on payment pages — assessed at least weekly

These exist because of e-skimming. Attackers compromise a third-party JavaScript library — an analytics tag, a chat widget, an A/B testing script — that loads on your checkout page, then inject code that silently exfiltrates card numbers as customers type. Your payment processor never sees the attack because the data is stolen before it reaches them.

If your checkout page loads Google Analytics, Meta Pixel, a Zendesk widget, or anything similar, you probably need SAQ A-EP.

SAQ B and SAQ B-IP — physical payment terminals

SAQ B covers merchants who accept cards through imprint machines or standalone dial-out terminals — the kind that aren't connected to the internet and transmit data over a phone line. No electronic storage of cardholder data, no internet connection. About 41 requirements.

SAQ B-IP is for merchants using standalone, IP-connected payment terminals that are not connected to any other systems in the merchant's environment. Think a countertop terminal that talks directly to the processor over the internet, with no integration to your POS software. About 83 requirements — more than SAQ B because the IP connection expands the attack surface.

Both SAQ B types require that the terminals are not connected to any other system and don't store cardholder data. If your terminal is integrated with your point-of-sale software, you're out of SAQ B territory and into SAQ C or SAQ D.

SAQ C — internet-connected payment apps without card storage

SAQ C is for merchants whose payment application connects to the internet for processing but doesn't store cardholder data. A restaurant using a POS system that processes payments through an internet connection, or a retail store using a payment application integrated with their checkout system, typically falls here.

About 160 requirements. The key distinction from SAQ D: no electronic cardholder data storage. If transactions are processed and card data is never written to disk or a database, SAQ C may apply. If there's any card storage — even temporary buffering that isn't cleared — you're looking at SAQ D.

SAQ C also applies to e-commerce merchants who process card data through an internet-connected payment application — but not to those who handle cardholder data only through a fully outsourced third-party solution (that would be SAQ A or SAQ A-EP).

SAQ P2PE — the shortest path for card-present merchants

If you've deployed a validated Point-to-Point Encryption solution from PCI SSC's approved P2PE solutions list, SAQ P2PE is for you. It carries about 35 requirements — the second-shortest form after SAQ A.

P2PE encrypts card data at the point of swipe or tap, before it ever enters the merchant's environment. The merchant never has access to unencrypted card data, which dramatically reduces the cardholder data environment (CDE) scope.

The catch: the P2PE solution must be on PCI SSC's validated P2PE solution list, and you must be implementing it exactly as described in the vendor's P2PE Instruction Manual (PIM). Any deviation — including connecting the terminal to unapproved network segments — takes you out of P2PE eligibility.

SAQ D — the catch-all (and the most common)

SAQ D Merchant is the full questionnaire. It covers all 12 PCI DSS requirements and includes roughly 285 individual controls in v4.0.1. It applies to any merchant who doesn't qualify for one of the shorter forms — which is most merchants who store any cardholder data electronically, run integrated e-commerce + card-present operations, or operate complex payment environments.

If you're unsure which SAQ applies to you, SAQ D is the safe default. Completing it means you're certifying against the complete standard. The risk of using a shorter SAQ incorrectly (certifying against fewer controls than apply to your environment) is worse than the administrative burden of completing SAQ D when a shorter form might have applied.

THERE'S ALSO SAQ D FOR SERVICE PROVIDERS

Service providers — companies that store, process, or transmit cardholder data on behalf of merchants — use a separate SAQ D variant with additional requirements not in the merchant version. If your company is a payment gateway, processor, or any third-party service that handles card data for other businesses, you need the service provider version and should be talking to a QSA, not self-assessing.

The complete SAQ comparison

SAQ Type Who it's for Approx. requirements Includes 6.4.3 + 11.6.1?
SAQ A Fully outsourced e-commerce/MOTO, no cardholder data on merchant systems, confirmed script safety ~22 No (eligibility confirmation instead)
SAQ A-EP E-commerce with redirect to third party, but merchant site can affect payment security ~191 Yes — mandatory
SAQ B Imprint machines or standalone dial-out terminals only ~41 No
SAQ B-IP Standalone IP-connected terminals, not integrated with other systems ~83 No
SAQ C Internet-connected payment applications, no cardholder data storage ~160 No
SAQ P2PE Merchants using a PCI-validated P2PE solution ~35 No
SAQ D (Merchant) All other merchants; stores cardholder data electronically or doesn't fit above ~285 Yes — mandatory

Check your security policies against PCI DSS automatically

PolicyAudit scans your security policy documents against PCI DSS v4.0.1 requirements — flagging missing controls, vague language, and gaps that would fail a SAQ review or QSA audit. Free for up to 3 documents, no credit card required.

Scan your policies for free →

The most common SAQ mistakes

Mistake 1: Using SAQ A when SAQ A-EP applies

This is by far the most common. A merchant uses Stripe, PayPal, or a similar processor, correctly identifies that they're "using a third-party processor," and picks SAQ A. But their site loads Google Tag Manager, which loads half a dozen third-party scripts on every page including checkout. That breaks SAQ A eligibility under v4.0.1 unless they can confirm none of those scripts can affect the payment system.

The test: open your checkout page, open your browser's network tab, and look at every script that loads. Can you account for every one? Do you have integrity hashes or monitoring for all of them? If not, SAQ A-EP is more likely correct.

Mistake 2: Assuming SAQ B applies to modern POS systems

If your point-of-sale system integrates with inventory management, customer loyalty, or any other software — it's almost certainly not SAQ B territory. SAQ B requires the terminal to be completely standalone with no connections to other systems in the merchant environment. Modern integrated POS setups typically land in SAQ C or SAQ D.

Mistake 3: Not asking your acquiring bank

Your acquiring bank (the bank that processes card payments for you) often specifies which SAQ you must complete. Many banks provide guidance based on your merchant category code and processing setup. If you're uncertain, ask them before self-selecting a form. They have the final say on what validation they'll accept.

Mistake 4: Treating SAQ completion as the compliance finish line

The SAQ is how you certify compliance — it's not what makes you compliant. Filling out the form without actually implementing the required controls is check-the-box compliance that will fail in an investigation after a breach. The controls in the SAQ (MFA, script inventory, penetration testing, log monitoring) need to actually be in place, documented, and operational.

WHAT HAPPENS IF YOU USE THE WRONG SAQ

Using the wrong SAQ means certifying compliance against fewer controls than actually apply to your environment. If a breach occurs, investigators will establish which SAQ should have applied — and if you were on SAQ A when SAQ A-EP or SAQ D was correct, you've self-certified compliance you didn't actually achieve. Card brand fines, forensic fees, card reissuance costs, and potential loss of card acceptance ability follow. The security gaps created by the wrong SAQ (missing script monitoring, weak authentication controls) are exactly what attackers exploit.

After you pick your SAQ: what comes next

Determining the right SAQ is step one. The actual compliance work happens before you complete it. The SAQ itself asks you to attest to controls that should already be in place — not controls you plan to implement.

For most merchants, the highest-friction items in 2026 assessments are:

  • MFA for all CDE access (Requirement 8.4) — mandatory under v4.0.1, not just for remote access
  • 12-character minimum passwords (Requirement 8.3.6) — up from 7 characters in older versions
  • Script inventory and monitoring (Requirements 6.4.3 and 11.6.1) — applies to SAQ A-EP and SAQ D merchants
  • Quarterly ASV scans — required for all merchant levels as a condition of SAQ completion
  • Information security policy documentation (Requirement 12) — must be reviewed annually and cover all 12 requirement areas

If your security policy documentation is incomplete or hasn't been updated to reflect v4.0.1 controls, that's where to start. Auditors — and the SAQ itself — will ask you to confirm those policies exist and are current.

Frequently asked questions

Which PCI SAQ do I need?
It depends on your payment processing method, not your transaction volume. Use the decision tree above: SAQ A for fully outsourced e-commerce with confirmed script safety; SAQ A-EP for e-commerce where your site could affect payment security; SAQ B or B-IP for standalone physical terminals; SAQ P2PE if you've deployed a validated P2PE solution; SAQ C for internet-connected payment apps without card storage; SAQ D for everyone else. When in doubt, ask your acquiring bank — their requirement overrides your own judgment.
What is the difference between SAQ A and SAQ A-EP?
SAQ A is for merchants who completely outsource payment processing with no cardholder data touching their systems — and can confirm their site isn't susceptible to script attacks. SAQ A-EP is for e-commerce merchants who redirect to a processor but whose website can influence the payment in any way, such as by loading JavaScript on the checkout page. SAQ A has about 22 requirements; SAQ A-EP has about 191, including the script integrity monitoring requirements (6.4.3 and 11.6.1).
What changed in PCI DSS v4.0.1 for SAQ A?
PCI SSC removed Requirements 6.4.3 and 11.6.1 from the SAQ A form itself, but added a new eligibility criterion: merchants must confirm their site is not susceptible to script attacks that could affect payment systems. Merchants can meet this by implementing the script controls described in 6.4.3 and 11.6.1, or by getting written confirmation from their compliant payment processor that their solution already does this. Merchants who can't make this confirmation need to move to SAQ A-EP.
Can I use SAQ A if I use Stripe or Shopify Payments?
Possibly. If you use Stripe's hosted Checkout (stripe.com domain) or Shopify's fully hosted checkout with no custom JavaScript that touches the checkout flow, you may qualify. If you use Stripe Elements with embedded card fields on your domain, or if your site loads any scripts that run on the checkout page, SAQ A-EP is more likely correct. Confirm directly with Stripe or Shopify — both publish guidance on which SAQ applies to their different integration types.
Does my SAQ type affect how many security controls I need?
Yes, significantly. SAQ A has about 22 requirements; SAQ D Merchant has about 285. But "fewer requirements" doesn't mean fewer security problems — it means fewer controls apply to your specific payment environment. The requirements in each SAQ are exactly the ones that address the attack surface created by your processing method. Using a shorter SAQ when a longer one applies doesn't reduce your actual risk — it just means you haven't addressed it.

Make sure your security policies satisfy PCI DSS before your SAQ review

PolicyAudit analyzes your information security policy documents against PCI DSS v4.0.1 requirements — identifying missing controls and language that wouldn't satisfy a SAQ attestation. Start with a free scan and know where you stand before you sign anything.

Check your policies for free →