Compliance

PCI-DSS Network Segmentation — Requirements & Design Checklist 2026

8 min read  ·  3 May 2026

Network segmentation is the most powerful lever available to organisations that process payment card data. Done correctly, it can cut your PCI-DSS compliance scope by 80% or more — reducing assessment costs, audit time, and breach exposure in one architectural decision.

Definition

PCI-DSS network segmentation is the isolation of the Cardholder Data Environment (CDE) — the systems that store, process, or transmit payment card data — from the rest of the network. Effective segmentation reduces PCI-DSS compliance scope, limits breach impact, and is one of the most cost-effective controls an organisation can implement.

PCI-DSS v4.0 Notice

PCI-DSS v4.0 (effective March 2025) requires organisations to document and justify their segmentation controls. Untested segmentation does not reduce scope — you must verify controls annually.

What counts as in-scope for PCI-DSS?

Understanding scope is the first step in segmentation design. Three categories of systems fall within PCI-DSS scope:

Effective segmentation creates a hard boundary that prevents connected systems from being classified as CDE components. A VLAN boundary backed by stateful firewall rules — with no permitted path from corporate LAN to CDE — means corporate workstations are out of scope entirely.

PCI-DSS v4.0 Segmentation Requirements

The following requirements from PCI-DSS v4.0 directly govern how your network must be designed and documented:

RequirementDescriptionNetwork Design Implication
1.3.2Restrict inbound and outbound traffic to the CDE to that which is necessaryFirewall rules must implement a default-deny posture with explicit permit rules for each required flow
1.3.3NSC (network security control) rule sets reviewed at least every six monthsMaintain a documented firewall change log; schedule biannual reviews in your compliance calendar
6.3.3All system components protected from known vulnerabilities via security patchesCDE systems must be on a patching VLAN with controlled update paths; lateral movement from unpatched hosts must be blocked
7.2.5All application and system accounts are managed by a documented policyManagement VLAN must be isolated; privileged access to CDE must transit a dedicated jump server
11.3.1Internal vulnerability scans performed at least quarterlyScanner must have access paths to CDE systems; scanner host is considered a connected system and must be secured accordingly
12.3.2Targeted risk analysis for all controls not mandated at a specific frequencySegmentation controls require a written risk analysis justifying the control approach; this must be reviewed annually

Segmentation Design Checklist

Use this checklist when designing or auditing your CDE segmentation architecture:

CDE is defined in a dedicated VLAN or network segment with no routing adjacency to corporate LAN
All traffic between CDE and non-CDE networks transits a stateful firewall with a documented default-deny rule set
POS terminals and payment gateways are in their own sub-segment, isolated even from other CDE systems where possible
Management access to CDE systems routes through a dedicated jump server on a separate management VLAN
Wireless networks are isolated — no SSID has a direct path to CDE without traversing a firewall
A network diagram showing all CDE boundaries, data flows, and firewall positions is maintained and kept current
Segmentation is tested at least annually by a qualified internal resource or external QSA using penetration testing methods

How VP Compass helps with PCI-DSS segmentation

VP Compass ships a purpose-built Retail / PCI-DSS template that implements the segmentation architecture described in this guide. You get:

Export your completed diagram as a DrawIO file or PNG for inclusion in your SAQ or ROC documentation. The diagram becomes living compliance evidence — update it whenever your network changes, and it stays current for the next assessment cycle.

Frequently Asked Questions

Does network segmentation reduce PCI-DSS scope?

Yes — effective network segmentation is the primary mechanism for reducing PCI-DSS scope. By isolating the Cardholder Data Environment (CDE) from all other systems, you limit which systems require PCI-DSS assessment. However, segmentation must be tested annually by a qualified security assessor or internal team to be recognised as scope-reducing.

What firewall rules are required for PCI-DSS?

PCI-DSS Requirement 1.3 requires firewalls to restrict all inbound and outbound traffic to the CDE to only that which is necessary for cardholder data processing. All other traffic must be explicitly denied. Firewall rule sets must be reviewed at least every six months (Requirement 1.3.2), and all rule changes must be documented.

How do I document network segmentation for PCI-DSS?

PCI-DSS v4.0 Requirement 12.3.2 requires a targeted risk analysis for all segmentation controls. Your documentation must include a network diagram showing CDE boundaries, a list of all systems in scope, firewall rule justifications, and evidence of annual segmentation testing. VP Compass exports network diagrams suitable for QSA review.

What is a cardholder data environment (CDE)?

The Cardholder Data Environment (CDE) is the set of systems, people, and processes that store, process, or transmit cardholder data or sensitive authentication data — or that can directly affect the security of such data. This includes POS terminals, payment gateways, card databases, and any systems with direct network connectivity to those components.

Design your PCI-DSS network topology

Start from the Retail/PCI-DSS template — CDE zone, DMZ, POS VLAN, and management VLAN pre-configured.

Use the Retail/PCI-DSS template in VP Compass →
← Back to Blog