May 2026Case Study

Case Study: From Zero to PCI DSS Certified — How a Fintech Startup Closed a $2M Enterprise Contract in 10 Weeks

By QuickTrust Editorial

Case Study: From Zero to PCI DSS Certified — How a Fintech Startup Closed a $2M Enterprise Contract in 10 Weeks

In March 2025, PayShift's CEO got a call she had been waiting six months for. Harrington Retail Group — a Fortune 500 retailer with 1,400 stores — was ready to move forward on an enterprise payments integration. PayShift's embedded payment platform would handle split settlements across Harrington's franchise network: a $2 million annual contract and a reference customer that would change their trajectory.

Then she read the security requirements attachment.

Harrington required PCI DSS Level 2 compliance before contract execution. They needed a completed SAQ D, signed by PayShift's executive officer, with an Attestation of Compliance from a QSA. The deal would be held until PayShift could deliver.

PayShift had built excellent payment infrastructure. Their transaction handling was clean, their uptime was strong, and their API architecture was well-designed. What they did not have was a PCI DSS compliance program.

Their engineering team of eight was in the middle of a critical product build. Taking that team offline for three to six months of compliance work was not an option.


The Challenge: Enterprise-Grade Compliance at Startup Speed

PayShift faced a problem that is increasingly common among B2B fintech companies: compliance requirements that appear late in the sales process, from buyers who cannot wait, and at a level of rigor that a small engineering team is not positioned to deliver.

Specific challenges:

The scope problem. PayShift's payment processing microservices were not segmented from the rest of their AWS infrastructure. Developers had broad access across production environments. The potential CDE scope included more than 60 EC2 instances and RDS databases — which would have made their compliance posture a Level 1 problem, not Level 2.

The timeline problem. Harrington's procurement team had a Q2 fiscal deadline. The contract needed to execute before June 30 or the budget authority would expire. PayShift had 10 weeks.

The bandwidth problem. Their Head of Engineering, Marco, had two engineers committed to a payment routing feature that three enterprise prospects were waiting for. Pulling those engineers into compliance work was a non-starter.

The expertise problem. The team knew their payment architecture well but had no experience with PCI DSS requirements, SAQ completion, or QSA engagement. Every hour they spent learning the standard was an hour not building product.

"We had built solid infrastructure. We just hadn't documented it, hadn't segmented it properly, and hadn't run it through the compliance lens that enterprise buyers require. I knew we were probably 80% of the way there on the technical controls — but I had no way to prove that to Harrington."

— Sarah Chen, CEO, PayShift


The Solution: QuickTrust PCI DSS Certification Fast Track

PayShift engaged QuickTrust the week after receiving Harrington's security requirements. The initial conversation focused on one question: could QuickTrust deliver a signed AOC in 10 weeks?

QuickTrust's assessment team spent three days reviewing PayShift's AWS environment, payment flow architecture, and existing controls. The findings:

  • PayShift's Stripe-based transaction processing was already using tokenization — card data did not persist in PayShift's databases
  • But the payment processing microservices lived in the same VPC as PayShift's analytics infrastructure, internal tooling, and developer access systems, putting those systems in scope
  • Logging was partial — CloudTrail was enabled but not shipping to a centralized SIEM; application logs were not retained for the required 12-month period
  • IAM policies were broad — several service accounts had wildcard S3 permissions; developer accounts had direct production database access
  • No formal policies existed for access control, incident response, change management, or vendor management
  • No vulnerability scanning program was in place

The good news: PayShift's scope could be dramatically reduced. Because they used Stripe tokenization and never stored PANs, the actual cardholder data environment was limited to the payment processing microservices and their associated database. With network segmentation, that was a 4-system CDE, not 60+ systems.

The target: SAQ D (required by Harrington's security team for merchants using card-not-present payment APIs, regardless of scope size) with a scope limited to the segmented CDE — reducing assessment complexity dramatically.

The Implementation Plan

QuickTrust's engineering team and PayShift agreed on a 10-week execution plan:

Weeks 1–2: Scope Reduction and Architecture QuickTrust engineers created a dedicated CDE VPC in PayShift's AWS environment and migrated the payment processing microservices into it. Strict security group rules were configured: the CDE VPC accepted inbound traffic only from a dedicated API gateway instance in the main application VPC, on port 443. All other traffic was blocked at both the security group and NACL level. VPC Flow Logs were enabled and shipping to a dedicated CloudWatch Log Group.

Weeks 3–5: Control Implementation Working directly in PayShift's AWS environment with a dedicated IAM role, QuickTrust's engineers implemented:

  • Logging: CloudTrail with S3 log archival (12-month retention), CloudWatch Logs for application-level events, centralized log aggregation with daily automated review alerts
  • IAM hardening: Developer production access revoked and replaced with AWS Systems Manager Session Manager (no open SSH ports), service account permissions scoped to minimum required actions, MFA enforced for all CDE access paths
  • Vulnerability management: AWS Inspector enabled for the CDE instances, external ASV scan configured through an approved scanning vendor, patch management schedule documented and initial scan completed with findings remediated
  • File integrity monitoring: AWS Config with custom rules monitoring CDE instance configurations for unauthorized changes
  • WAF: AWS WAF deployed in front of the payment API gateway with OWASP Core Rule Set

Weeks 6–7: Policy Documentation QuickTrust's compliance team delivered a complete policy suite using PayShift's specific environment details, personnel, and control implementations:

  • Information Security Policy
  • Access Control Policy
  • Incident Response Plan (with Harrington-specific escalation contacts for breach notification)
  • Change Management Policy
  • Vendor Management Policy
  • Password and Authentication Policy
  • Data Classification Policy

All policies were reviewed by PayShift's CEO and CTO, signed, and entered into version control.

Weeks 8–9: SAQ Completion and Evidence Package QuickTrust's compliance team completed the SAQ D with PayShift's team, mapping each applicable requirement to the implemented control and the associated evidence. The evidence package included:

  • Network diagrams showing the segmented CDE with labeled traffic flows
  • AWS Config compliance reports for all in-scope instances
  • CloudTrail log excerpts demonstrating audit trail completeness
  • IAM policy exports proving least-privilege configuration
  • ASV scan completion certificates and remediation documentation
  • Training completion records for all PayShift personnel
  • Signed policy acknowledgment records

Week 10: QSA Review and AOC QuickTrust coordinated a QSA review of the completed SAQ D and evidence package. The QSA conducted a documentation review and environment walkthrough — a process that took two days given the clarity and completeness of the evidence package. Minor clarifications were addressed in the first day. The Attestation of Compliance was signed by the QSA and PayShift's CEO on day ten of week 10.


The Results

PCI DSS Certified: 10 weeks, zero audit findings

The signed AOC and SAQ D were delivered to Harrington Retail Group on May 28, 2025 — two days before their June 1 deadline.

Engineering time invested by PayShift's team: 18 hours

Marco, PayShift's Head of Engineering, provided system access credentials, reviewed and approved the network architecture changes, participated in a two-hour SAQ review session, and attended the QSA walkthrough call. The payment routing feature his team had been building shipped on schedule.

"I was fully expecting to lose two engineers for a month. Instead, I was on calls for maybe 18 hours total and reviewed a few architecture diagrams. QuickTrust had a team that knew exactly what to build — they didn't need us to explain PCI to them or hold their hand through AWS. They just got it done."

— Marco Lanza, Head of Engineering, PayShift

$2M enterprise contract signed: June 12, 2025

Harrington's procurement team countersigned the PayShift contract 12 days after receiving the AOC. The contract included a three-year term with a 25% discount in exchange for the term commitment — a deal structure PayShift would not have been able to offer if compliance had taken six months.

Additional pipeline unlocked: $1.4M in pipeline

With PCI DSS certification in hand, PayShift's sales team unblocked three additional enterprise prospects who had been waiting on compliance documentation. Within 60 days of the Harrington close, two of those three deals advanced to final negotiation. PayShift's CEO attributes $1.4M in near-term pipeline directly to the PCI certification.

"The Harrington contract was the one we were chasing. But what we didn't expect was how many other deals the certification unlocked immediately. Apparently several other prospects had put us on hold waiting to see if we could actually get this done."

— Sarah Chen, CEO, PayShift


Key Outcomes Summary

MetricResult
Time to PCI DSS certification10 weeks
Internal engineering hours18 hours
Audit findingsZero
Deal unlocked$2M annual contract
Additional pipeline unblocked$1.4M
CDE scope (before)60+ systems
CDE scope (after segmentation)4 systems
Ongoing maintenance timeUnder 2 hours/week

What Made the Difference

Three factors separated PayShift's outcome from the typical SaaS compliance horror story:

1. Scope reduction first. The decision to segment the CDE before anything else reduced the compliance surface from 60+ systems to 4. This compressed the assessment, reduced tool costs, and eliminated months of potential remediation work.

2. Engineers, not consultants. QuickTrust's team implemented controls directly rather than writing recommendations for PayShift's engineers to implement. There was no translation layer between the compliance guidance and the technical execution.

3. Evidence-first documentation. QuickTrust built the evidence package alongside the control implementation, not after. By the time the SAQ was complete, the evidence existed. There was no scramble for documentation in the final weeks.


Is This Repeatable?

PayShift's situation is common: a well-engineered product, an enterprise buyer with a compliance requirement, and a small team that cannot afford to stop building.

QuickTrust's Certification Fast Track is designed for exactly this situation. Not every certification completes in 10 weeks — complexity varies — but most SaaS companies targeting SAQ A-EP or SAQ D can achieve a signed AOC in 8–12 weeks with QuickTrust's implementation-first model.

100% audit pass rate. 6–10 weeks. Your engineering team contributes fewer than 20 hours.



Start Your Certification Sprint

Your enterprise deal is waiting. QuickTrust's engineers implement your PCI DSS controls, document your environment, and coordinate your QSA — while your team keeps building.

Start your certification sprint at trust.quickintell.com

Need PCI DSS compliance?

Our engineers implement PCI controls, prepare evidence, and coordinate your assessment.

Get PCI DSS Ready

Related Articles