Skip to main content
Compliance Workflows

PCI DSS Vendor Due Diligence: What Requirement 12.8 Actually Demands

March 25, 2026

PCI DSS Requirement 12.8 mandates that organizations maintain and manage third-party service providers (TPSPs) that handle cardholder data or could affect the security of the cardholder data environment. With PCI DSS 4.0 now in effect, the requirements have expanded — including documented risk assessments, written agreements, and annual monitoring. This guide breaks down each sub-requirement, what your QSA checks, and how to build a compliant vendor management program.

Requirement 12.8 breakdown

PCI DSS 4.0 Requirement 12.8 contains five sub-requirements:

12.8.1 — Maintain a list of all TPSPs with which account data is shared or that could affect the security of account data, including a description of each service provided. This is your vendor inventory — and the QSA will compare it against actual data flows.

12.8.2 — Maintain written agreements with all TPSPs that include the TPSP's acknowledgment of their responsibility for the security of account data they possess, or to the extent they could impact the security of the entity's cardholder data environment. BAAs, DPAs, or specific PCI-responsibility clauses in master service agreements satisfy this.

12.8.3 — Establish a process for engaging TPSPs, including proper due diligence prior to engagement. This means documented vendor risk assessment before onboarding — not after.

12.8.4 — Monitor TPSPs' PCI DSS compliance status at least annually. Check whether they maintain a current AOC (Attestation of Compliance) or SAQ (Self-Assessment Questionnaire).

12.8.5 — Maintain information about which PCI DSS requirements are managed by each TPSP, which are managed by the entity, and any shared between the TPSP and the entity. This is the responsibility matrix.

Which vendors require assessment

Any vendor that stores, processes, or transmits cardholder data is in scope for 12.8. But PCI DSS 4.0 extends this to vendors that "could affect the security of" the cardholder data environment — a broader scope than previous versions. This includes: payment processors and gateways, hosting providers for cardholder data environments, managed security service providers, tokenization vendors, penetration testing firms, and potentially cloud infrastructure providers even if they don't directly handle card data. Your QSA will review your vendor inventory against your network diagram and data flow documentation to identify gaps.

What your QSA looks for

During a PCI DSS assessment, your QSA evaluates vendor management across several dimensions:

Completeness of vendor inventory. Are all TPSPs listed? Does the list match data flow documentation? Are descriptions accurate?

Written agreements. Does each TPSP have a documented agreement acknowledging their PCI responsibilities? Are agreements current?

Due diligence evidence. Is there documented risk assessment for each TPSP? Was it performed before onboarding? What sources were checked?

Annual monitoring. Can you show annual review of each TPSP's compliance status? Do you have current AOCs or evidence of PCI compliance for each?

Responsibility matrix. Is there clear documentation of which PCI requirements each TPSP manages vs. which you manage? Are shared responsibilities explicitly defined?

The QSA may sample 3-5 vendors and trace through the full documentation chain for each.

The annual reassessment requirement

Requirement 12.8.4 mandates at least annual monitoring of TPSP PCI DSS compliance status. In practice, this means: requesting current AOC or SAQ from each TPSP annually, verifying the attestation is current (not expired), checking whether the TPSP's scope of attestation covers the services they provide to you, and documenting the review date and reviewer. For vendors that don't have a PCI attestation, document your risk assessment and compensating controls. Not having an AOC isn't disqualifying — but it requires documented justification and additional risk mitigation.

Common 12.8 gaps that get flagged

Incomplete TPSP inventory. The most common finding. Teams forget about SaaS tools that touch reporting data, cloud services that host parts of the CDE, or vendors that provide security services. Build your inventory from payment flow diagrams, not just procurement records.

Missing responsibility matrices. 12.8.5 is new in PCI DSS 4.0 and many organizations haven't built these yet. For each TPSP, document which PCI requirements they handle, which you handle, and which are shared.

Expired or missing AOCs. Annual monitoring means current documentation. An AOC from 2023 doesn't satisfy 2025 monitoring requirements. Set calendar reminders for annual AOC requests.

No pre-engagement due diligence. 12.8.3 requires due diligence before engaging a TPSP. If you can't show assessment documentation dated before the vendor was onboarded, it's a finding. For existing vendors, document your retrospective assessment.

Self-reported compliance claims without verification. A vendor saying "we're PCI compliant" on their website is not evidence. Request the AOC or conduct independent verification.

See this in action

ThirdProof automates vendor risk assessment across 24 intelligence sources. Investigate any vendor in under 2 minutes — no questionnaires, no vendor cooperation required.

Try ThirdProof Free →

No credit card required

Frequently asked questions

What does PCI DSS Requirement 12.8 require?+
Requirement 12.8 requires five things: maintaining a vendor inventory (12.8.1), written agreements with each TPSP (12.8.2), due diligence before engagement (12.8.3), annual monitoring of PCI compliance status (12.8.4), and a responsibility matrix documenting which PCI requirements each party manages (12.8.5).
Do all vendors need PCI DSS assessment?+
Only vendors that store, process, or transmit cardholder data, or that could affect the security of your cardholder data environment. This includes payment processors, hosting providers for CDE systems, security service providers, and tokenization vendors. Your QSA will verify your scoping against data flow documentation.
How does ThirdProof help with PCI DSS 12.8?+
ThirdProof automates vendor due diligence for PCI DSS 12.8.3 — the pre-engagement and ongoing risk assessment requirement. Each investigation checks 24 intelligence sources including sanctions screening, cyber risk analysis, certification verification, and adverse media scanning. The audit-ready PDF report provides documented evidence of assessment. For 12.8.4, ThirdProof's certification verification checks whether vendors maintain current SOC 2 attestation, which often correlates with PCI compliance posture.
What is a PCI DSS responsibility matrix?+
A responsibility matrix (required by 12.8.5) documents which PCI DSS requirements are managed by the TPSP, which by your organization, and which are shared. For example, a payment processor may manage encryption in transit (Req 4), while you manage access controls to the integration (Req 7). This prevents gaps where both parties assume the other handles a requirement.
How often do I need to reassess PCI vendors?+
PCI DSS 12.8.4 requires at least annual monitoring of TPSP compliance status. Best practice is to request updated AOCs annually, verify attestation scope and currency, and reassess vendor risk when material changes occur — new services, breaches, or regulatory actions.

Put this into practice

Investigate any vendor across 24 intelligence sources in under 2 minutes. Your first 3 investigations are free.

Start Free Investigation →

No credit card required