Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » PCI DSS » PCI DSS Approved Scanning Vendor

PCI DSS Approved Scanning Vendor

An ASV is an organization that uses a set of security tools and services (called “ASV scan solution”) to perform external vulnerability scans. Their goal is to test the security posture of a business environment and identify vulnerabilities, misconfigurations, and other gaps in a security system that can be used to cause a security incident. 

This helps organizations improve their data security and meet PCI DSS requirements.

An ASV’s scan solution is rigorously tested and approved by the PCI SSC. Only then do they earn a spot on the PCI SSC’s List of Approved Scanning Vendors.

Key stages in PCI ASV scanning:

  • Determine the scope: The customer determines what parts of their internet-facing system, including components related to cardholder data, should be scanned.
  • Scan: The ASV conducts vulnerability scans using its scanning tools. Different sections of the Cardholder Data Environment (CDE) can be scanned separately.
  • Remediation: After scanning, the ASV shares interim results with the customer, who then takes necessary actions to fix any issues.
  • Resolution: If there are disagreements about scan results, the client and ASV work together to resolve them.
  • Rescan (if needed): Additional scans are performed until all conflicts and exceptions are resolved.
  • Final reporting: When no vulnerabilities remain, the ASV generates a report approved by PCI ASV and securely delivers it to the customer.

Additional reading

What is SSAE 18? (Is it Still Required in 2025)

Most businesses today rely on the cloud, and it can be challenging to ensure that data – whether it’s payroll information, cloud files, or other sensitive material – remains well-protected and organized.  That’s where the American Institute of Certified Public Accountants (AICPA) comes in with its SOC 1 attestation requirements. Originally codified under forms like…
Internal Audit Software

Top 7 Internal Audit Software

When issues arise in an external audit, the first question that top management asks is if these issues were highlighted during an internal audit. It automatically suggests a failure to address potential weaknesses that were identified earlier in the process. Internal audits are a crucial component of the certification process. However manual methods of filling…
Data Governance policy ; Examples & Templates

Data Governance Policy: Steps to Create, Examples and Templates

When leaders discuss the biggest data governance implementation challenges, they often mention the challenge of getting the stakeholders on board. This difficulty typically arises from a lack of data literacy and tooling, combined with the complex notions about execution. Now imagine a document that guides them on the hows and whys, serving as a blueprint…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.