If you process card payments; even through a third-party like Stripe or Braintree; there’s a good chance you need a quarterly PCI ASV scan. Most SaaS founders and IT managers discover this later than they should, usually when a payment processor or acquirer asks for a passing report and there isn’t one.
This guide explains exactly what PCI ASV scanning involves, who needs it, what causes failures, and how to get through the process without wasting weeks.
The PCI DSS (Payment Card Industry Data Security Standard) requires certain businesses to undergo quarterly external vulnerability scans conducted by an approved scanning vendor. That’s what ASV stands for; and the scan itself is called a PCI ASV scan or external PCI scan.
The scan checks your external-facing IP addresses and hostnames for known vulnerabilities that could expose cardholder data to attackers. Think open ports, outdated software, misconfigurations, unpatched CVEs ; the kinds of things a bad actor would exploit before you even noticed.
Secusy ASV Scanner is a PCI approved ASV Scanner
An ASV is a company or individual that has been certified by the PCI Security Standards Council (PCI SSC) to perform external vulnerability scans. You can't self-certify these scans; they must come from a PCI SSC-approved vendor like Secusy ASV.
Not every merchant or service provider needs an ASV scan; but most do once you reach a certain transaction volume or compliance level. Here’s the breakdown:
| Merchant Level | Quarterly ASV scan required? | Notes |
|---|---|---|
| Level 1 | Yes | Over 6M Visa/Mastercard transactions per year |
| Level 2 | Yes | 1M–6M transactions/year |
| Level 3 | Yes | 20K–1M e-commerce transactions |
| Level 4 | Recommended / often required by acquirer | Smaller merchants — check with your bank |
| Service Providers | Yes | All levels of service providers in scope |
If your SaaS product handles payments; even via a third party; you likely fall into scope. Many founders assume that using Stripe or Braintree removes them from PCI scope entirely. It narrows it significantly, but rarely eliminates it. Your hosting infrastructure, APIs, and network still count.
Book your PCI ASV scan with Secusy ASV today. Fast turnaround, transparent pricing, and real human support; no waiting around.
You identify all external-facing IP addresses and domains that are in scope for PCI DSS. This includes web servers, APIs, cloud instances, load balancers, and anything else that sits on the boundary between your system and the public internet.
You hand your IP list to your approved scanning vendor. They schedule and run the scan — typically automated — against those targets. You don't need to be heavily involved at this stage.
The ASV tool runs through your external surface, checking for known CVEs, open risky ports, exposed services, outdated TLS/SSL configurations, and more. Results are logged with severity ratings.
Any finding rated medium, high, or critical must be addressed before you can pass. Your team fixes the issues (patching, reconfiguring, closing ports) and requests a rescan.
Once all high-severity findings are resolved, your ASV issues a passing scan report. That report is submitted to your acquirer, QSA, or compliance portal. Done — until next quarter. You may do more scans as a security hygine.
The uncomfortable truth:
Most first-time ASV scan failures are caused by three things; open ports that shouldn't be open, unpatched software components, and SSL/TLS misconfigurations. All three are preventable before the scan ever runs.
Secusy ASV delivers fast turnaround, transparent pricing, and expert support from day one.
Failing an ASV scan is extremely common on the first attempt. Here's what typically goes wrong — and the practical fix for each:
Teams forget staging environments, third-party integrations running on their IP space, or cloud instances spun up without proper tracking. The fix: audit your entire external attack surface before submitting. Use a tool like Shodan or your cloud provider's asset inventory to sanity-check what's publicly visible.
TLS 1.0 and 1.1 are still flagged by many ASV tools, even on servers where the actual card data never flows. PCI DSS 4.0 is particularly strict here. Disable legacy protocols across all in-scope hosts — not just your primary payment endpoint.
Many teams patch their main web servers religiously but forget about SSH on port 2222, admin panels on high ports, or internal monitoring tools accidentally exposed to the internet. Scan your own infrastructure first with an open-source tool like Nmap before the ASV does
Sometimes ASV tools flag things incorrectly. You have the right to dispute findings — but most teams either ignore the dispute process or submit weak evidence. A solid dispute needs: proof the finding doesn't apply (screenshots, config dumps, vendor documentation) and a clear written explanation. Secusy ASV's support team can walk you through this directly.
The scan, remediation, rescan, and report submission cycle can take two to three weeks if issues are found. Starting your quarterly PCI scan in week 12 of the quarter is how you miss deadlines. Build in buffer — ideally start by week 8.
Secusy ASV offers fast rescans, expert dispute support, and pricing that doesn't penalise you for needing multiple attempts.
Acquirers and QSAs expect clean, readable reports. If your ASV’s report format is confusing or missing required fields, it creates unnecessary back-and-forth. This is one area where the quality of your vendor matters more than people realise.
How to prepare your infrastructure for PCI DSS 4.0 compliance — a step-by-step readiness guide for engineering teams.
Some vendors take 5–7 business days to deliver scan results. Others, including Secusy ASV, turn around results significantly faster. In a compliance crunch, that difference is material.
Ask directly: are rescans included, or do they cost extra? This is a common profit centre for vendors. If you fail your first scan (which is common) you shouldn't be penalised for it.
When you have a false positive or a confusing finding at 4pm on a Friday before a compliance deadline, you want a real person to speak to. Not a ticket queue with a 48-hour SLA.
Request a sample report before committing. It should be clean, structured, and formatted in a way that your acquirer or QSA will accept without pushing back.
What to look for in a PCI ASV vendor; a buyer's checklist for IT managers.
PCI ASV scanning is a quarterly external vulnerability scan required under PCI DSS for merchants and service providers that store, process, or transmit cardholder data. It must be conducted by an approved scanning vendor (ASV) certified by the PCI SSC. Most Level 1–3 merchants and all in-scope service providers are required to complete it every quarter.
The external PCI scan requirement covers all externally facing IP addresses and hostnames in your cardholder data environment (CDE). The scan looks for known vulnerabilities, open ports, outdated services, and misconfigurations that could expose cardholder data. Internal systems are not in scope for ASV scans — those fall under internal vulnerability scanning requirements.
The scan itself typically runs in a matter of hours depending on the number of IPs in scope. Turnaround time for results varies by vendor; from same-day with some providers to 5–7 business days with others. If issues are found and remediation is needed, allow 1–2 additional weeks for fixes and a rescan before expecting a clean passing report.
A failed scan is not a compliance violation in itself — it's part of the process. You remediate the flagged issues, request a rescan, and receive a new report. You only submit a passing report to your acquirer or QSA. The key is not leaving it so late in the quarter that you can't complete the remediation cycle in time.
A PCI ASV scan is an automated external vulnerability scan run by a certified vendor. A penetration test involves a human tester actively attempting to exploit vulnerabilities, often including internal systems. Both are PCI DSS requirements, but they serve different purposes and fall under different requirements (11.3.1 for pen testing, 11.3.2 for ASV scanning).
It must be an ASV. The PCI SSC maintains an official list of approved scanning vendors on their website. Using an unapproved tool or self-scanning does not satisfy the PCI DSS quarterly scan requirement, regardless of how comprehensive the scan is. Your acquirer or QSA will only accept reports from vendors on the approved list.
Secusy ASV offers fast turnaround, transparent pricing with rescans included, and real support when you need it. No enterprise complexity, no surprise costs. Just a clean, PCI SSC-compliant scan you can submit with confidence.
Subscribe now to keep reading and get access to the full archive.