If you found this blog post interesting you might also enjoy our regular series of webinars about practical ways to improve the security of people working outside the office.

Organisations that process or store payment data are familiar with the PCI DSS framework. Its principles are clear: control access, segment networks, test regularly, and prove compliance. Yet despite this clarity, many compliance teams find their testing and audit costs rising year after year.

A key driver of these costs is often scope. Every uncontrolled access point, router, and network that can connect to systems handling cardholder data must be included, tested, or validated. The challenge is no longer limited to data centres and firewalls, but also to what happens at the edges; in the homes, serviced offices, and client sites where staff still connect to company systems.

Where PCI DSS Costs Really Build Up

The cost of PCI DSS compliance grows in direct proportion to the size of the environment in scope.

Testing requirements under section 11.4 demand penetration testing at least annually and after significant changes. This includes validation of segmentation controls (Requirement 11.4.5). When staff connect from unmanaged networks, each unique environment adds to what must be reviewed and proven.

Segmentation tests must demonstrate that systems handling cardholder data are isolated from all out-of-scope networks. The more unknown routers, Wi-Fi configurations, and access methods involved, the more complex that testing becomes.

Oversight of third-party service providers under section 12.8 adds further workload. Every external route or service involved in handling or transmitting data must have documented agreements, annual monitoring, and validation of PCI compliance status.

Each of these tasks consumes time. For assessors, that time directly drives cost.

Why the Network Edge Matters

Most organisations have already hardened their internal and office-based networks. The hidden exposure now lies elsewhere.

Staff still access company systems from personal networks, serviced or shared offices, and client sites. Each of these environments sits outside IT control. A single misconfigured router or shared connection can expose a path into the cardholder data environment (CDE).

From a compliance standpoint, this also expands audit scope. Where segmentation is used to exclude those networks, PCI DSS requires clear proof that the segmentation is effective (Requirement 11.4.5).

Fewer variations in network setup mean fewer configurations to test, less time spent gathering evidence, and ultimately lower audit cost.

How Edge Control Helps Reduce Testing and Audit Load

Centralising and managing off-office access can directly influence PCI scope.

When all staff connections pass through a standardised, work-only network path, the assessor can validate that single configuration instead of hundreds of unpredictable home setups. This simplifies penetration testing under Requirement 11.4.5 and reduces the need for retesting under Requirement 11.4.4.

This is where measurable cost reduction occurs: fewer test variants, fewer findings, and faster evidence collection.

Design Principles That Support Cost-Efficient Compliance

Certain architectural choices make PCI DSS compliance simpler and more defensible.

Clear network separation for work traffic

Segmentation between the CDE and all other systems is a core principle. If used to reduce scope, segmentation must be validated through penetration testing (Requirement 11.4.5). Using a consistent, isolated work-only network for all off-office staff makes that validation easier to plan and repeat.

Consistent, locked-down configuration and firmware

PCI DSS expects secure configuration of all system components, including those with differing security needs (Requirements 2.2.3, 2.2.6, 2.2.7). Managed devices with hardened firmware and central control reduce variance and simplify evidence collection.

Strong authentication for remote access

Multi-factor authentication (MFA) is required for all remote access that could access or impact the CDE (Requirements 8.4.1 to 8.4.3). By routing all offsite connections through a trusted network edge, Loxada makes it easier to apply and audit MFA consistently, particularly when using conditional access or network-based policies.

Clarity around third-party access

Organisations must maintain a list of third-party service providers, written agreements, and annual monitoring of their PCI compliance (Requirements 12.8.1 to 12.8.5). Having a clearly defined access path with logging and visibility simplifies oversight and reduces ambiguity when assigning responsibilities.

Evidence for segmentation and testing

Penetration testing must follow a defined methodology and be performed by qualified personnel (Requirements 11.4.2 to 11.4.3). Using a single, controlled edge design limits the number of network states the tester must assess, making repeat testing more efficient.

A Practical Example

Imagine an organisation with 300 employees who access internal systems from home or client networks using consumer-grade routers. Each unique configuration that provides a potential path into the CDE must be considered during segmentation validation. Even if the CDE is centrally secured, auditors will still request evidence that these external paths cannot reach it.

Now imagine those same 300 employees connecting through managed, identical work-only routers, with no other uncontrolled access paths in place. The compliance task shifts: the assessor can test and approve that single configuration once, rather than repeating validation across hundreds of varied environments.

The result is reduced scope, less duplication, and lower audit cost, all while strengthening control and consistency.

Addressing Common Assumptions

“We already use a VPN.”

VPNs secure traffic, not the network they run on. PCI DSS still requires segmentation testing (Requirement 11.4.5) to confirm the CDE is isolated from other devices. A managed router that separates business traffic from home or guest devices provides that evidence.

“We’ve returned to the office.”

PCI DSS applies to all systems that can access or impact the CDE, including remote access during weekends, travel, or after-hours work. MFA and segmentation controls must still apply (Requirements 8.4.2 and 11.4.5).

“Our service provider handles it.”

Even when services are outsourced, organisations retain ultimate responsibility. PCI requires written agreements, due diligence, and annual monitoring of each third-party provider (Requirements 12.8.1 to 12.8.5).

Where Loxada Fits In

Loxada provides managed routers that create a secure, work-only connection for staff connecting from homes, serviced offices, or client sites. Each router runs hardened firmware, receives automatic updates, and ensures business traffic stays separate from personal use.

This directly supports key PCI DSS objectives:

  • Segmentation validation: Uniform network design makes testing under Requirement 11.4.5 consistent and repeatable
  • Strong authentication control: By routing all offsite connections through a trusted network edge, Loxada makes it easier to apply and audit MFA consistently
  • Secure configuration management: Standardised firmware and settings align with secure build requirements (2.2.3, 2.2.6, 2.2.7)
  • Third-party oversight: Clear network boundaries and auditable logs support compliance with oversight requirements (12.8.1 to 12.8.5)

By reducing variation at the uncontrolled network edge, organisations can present a smaller, more predictable environment for assessors to test. This lowers both compliance effort and cost.

The Bottom Line

PCI DSS compliance is not just about meeting requirements. It is about managing scope effectively.

Every uncontrolled access path adds cost, risk, and complexity. By using managed, work-only network connections, organisations gain stronger segmentation, simpler evidence, and more predictable compliance outcomes.

For teams under pressure to reduce audit effort without compromising security, securing the network edge remains one of the few changes that delivers both.

If you found this blog post interesting you might also enjoy our regular series of webinars about practical ways to improve the security of people working outside the office.