Technology

PCI‑DSS Compliant E‑Commerce Hosting Guide: Servers, SSL, Logs and Backups

Why PCI‑DSS matters for your e‑commerce hosting

If your online store touches cardholder data in any way, PCI‑DSS is not optional. Whether you run a small WooCommerce shop or a multi‑store Magento deployment, the way you host, encrypt, log and back up your environment directly affects your compliance status. Card brands and banks do not really care which shopping cart you use; they care about whether card data can leak from a misconfigured server, weak TLS or missing audit logs.

At dchost.com we regularly sit in on security and infrastructure planning meetings with merchants who are expanding from a simple shared hosting setup to a more controlled VPS or dedicated environment. The same questions keep coming up: What exactly has to be on a separate server? Which TLS versions are allowed? How long should logs and backups be kept, and how do we prove they were not tampered with?

This guide walks through PCI‑DSS hosting requirements with a practical focus on four areas you can control on day one: server architecture, SSL/TLS, logging and monitoring, and backups and disaster recovery. The goal is not to turn you into a QSA but to give you a concrete, technically realistic checklist you can implement on dchost.com infrastructure.

1. PCI‑DSS basics: scope, SAQs and what hosting can (and cannot) solve

PCI‑DSS is the Payment Card Industry Data Security Standard, a set of technical and process requirements that applies to any system that stores, processes or transmits cardholder data. For hosting, the two most important ideas are scope and segmentation.

Scope: which systems are in the cardholder data environment

Your PCI scope includes:

  • Web servers that receive card data or host payment forms
  • APIs and backend services that relay payment information
  • Databases or caches that store customer or payment‑related data
  • Logging, backup and monitoring systems that contain any of the above

If your store uses fully hosted payment pages or payment links, you may qualify for a lighter SAQ (Self‑Assessment Questionnaire) such as SAQ A. If the payment form is served from your own domain and the card data passes through your application before being tokenised, you are usually in SAQ A‑EP territory with heavier technical requirements on your servers.

We explored this distinction in more detail in our article PCI DSS for e‑commerce on the hosting side, but the short version is simple: the more your own infrastructure touches card data, the more controls you must implement.

What hosting can solve vs what stays in your processes

Your hosting layer can address many of the technical controls in PCI‑DSS, for example:

  • Secure server builds, patching and network firewalls
  • Strong TLS configuration and certificate management
  • Centralised logging, log retention and access control
  • Encrypted, tested backup and restore procedures

Other PCI requirements live in your organisation, such as formal policies, staff training, incident response and vendor management. A realistic PCI plan combines both: hardening your dchost.com servers and also documenting who can access what, how you handle disputes and how you respond to potential breaches.

2. Server and network architecture for PCI‑DSS compliant hosting

Once you know your SAQ type and scope, the next decision is hosting architecture. PCI‑DSS does not force you into a specific product, but some choices make compliance much easier.

Shared hosting vs VPS vs dedicated vs colocation

For very small stores using redirect‑based or hosted payment pages, shared hosting can still be acceptable if you keep your store firmly in SAQ A and ensure no card data ever touches your code or server. As soon as you serve payment forms from your own domain or integrate more complex flows, you typically move to VPS, dedicated or colocated servers so you can control firewalls, logging and hardening.

  • VPS: Good balance of isolation, flexibility and cost. You get root access, can tune the OS, firewall and TLS, and can segment applications using multiple VPSs.
  • Dedicated servers: Full hardware isolation, useful for high‑traffic or very strict compliance environments. You can separate web, database, logging and backup servers on dedicated hardware.
  • Colocation: You own the hardware, we provide the data center, power, cooling and network. This suits organisations with strict internal standards or existing on‑prem standards they want to replicate.

If you are comparing options, our article Dedicated server vs VPS: which one fits your business walks through the trade‑offs from a performance and management perspective.

Network segmentation and firewalls

PCI‑DSS expects you to minimise the systems directly exposed to the internet and strictly limit access to the cardholder data environment. In hosting terms this usually means:

  • Placing a reverse proxy or load balancer in front of your application servers
  • Restricting inbound traffic with a stateful firewall, only opening ports that are needed (for example 80/443 to the public, SSH only from admin IP ranges or VPN)
  • Separating web, application and database servers onto different network segments or VLANs when possible
  • Using a Web Application Firewall (WAF) to block common attack patterns before they hit your app

On a single powerful VPS you can still apply logical segmentation by running separate firewalled services, containers or VMs and forcing all database access through strict IP‑based and user‑based controls.

Server build and hardening

PCI‑DSS includes a long list of system hardening expectations. On your dchost.com VPS or dedicated server you should at least:

  • Use a modern, supported Linux distribution and keep it patched
  • Disable unused services and remove sample apps and default accounts
  • Enforce strong SSH security: key‑based auth, non‑root logins, restricted groups, optional 2FA
  • Apply the principle of least privilege for system users and service accounts
  • Use file permissions appropriate for web apps, similar to the 644/755 guidelines we cover in our Linux file permissions guide

Do not underestimate default settings. A single forgotten test vhost with directory listing enabled can leak logs, configuration files or even environment variables that contain secrets.

Isolating payment functionality

For larger stores, it is often worth hosting payment‑related components more tightly isolated than the rest of the site. For example:

  • Public storefront on one VPS or server
  • Checkout and payment microservice on a separate server or at least separate container/network segment
  • Database and caching servers in a private network, with no direct internet access

This segmentation makes it easier to define PCI scope, apply stricter logging and access control, and prove to auditors that a compromise of, say, your blog subdomain does not automatically grant access to payment systems.

3. SSL/TLS and certificate requirements for PCI‑DSS

From a PCI point of view, insecure transport is a direct path to card data theft. The standard is explicit: cardholder data must never cross the network in clear text, and weak protocols and ciphers must be disabled.

Protocols and cipher suites

On your web servers and load balancers you should:

  • Disable SSLv2, SSLv3, TLS 1.0 and TLS 1.1. Support only TLS 1.2 and TLS 1.3.
  • Use strong cipher suites that provide forward secrecy (ECDHE key exchange) and modern AEAD ciphers like AES‑GCM or CHACHA20‑POLY1305.
  • Turn off weak options such as NULL, EXPORT and RC4 ciphers.
  • Prefer secure curves and key sizes: 2048‑bit RSA minimum, ECDSA with modern curves where supported.

Our articles on keeping SSL/TLS settings up to date and enabling TLS 1.3, OCSP stapling and HSTS show concrete Nginx and Apache configurations you can adapt for your store.

Certificate types: DV, OV, EV and wildcards

PCI‑DSS does not force you to use a specific certificate type, but for e‑commerce there are practical considerations:

  • DV (Domain Validation): Technically secure and fine for the protocol, but offers no verified organisation details.
  • OV (Organisation Validation): Adds verified business identity, which can improve trust for corporate stores.
  • EV (Extended Validation): Historically more visible in browsers; today less prominent, but some enterprises still prefer it for legal or policy reasons.
  • Wildcard: Convenient for many subdomains under one parent domain, but must be protected carefully because compromise impacts all covered hosts.

We compare these options in depth in our guide to choosing between free and commercial SSL for e‑commerce. For many merchants a mix works well: DV or wildcard certificates for non‑critical subdomains, and OV or EV for the main checkout domain.

Practical TLS hardening tips

Some practical measures we recommend on dchost.com servers:

  • Redirect all HTTP traffic to HTTPS using 301 redirects and update internal links
  • Enable HSTS (HTTP Strict Transport Security) after verifying that HTTPS works everywhere
  • Use secure cookie flags: Secure, HttpOnly and appropriate SameSite settings for session cookies
  • Configure OCSP stapling for faster and more reliable certificate validation
  • Automate certificate renewal, whether using ACME for DV certs or an API/integration for commercial certificates

PCI‑DSS also expects you to maintain an inventory of certificates and update them before expiry. Automating renewals and monitoring dates removes a large class of avoidable outages and compliance findings.

4. Logging, monitoring and retention for PCI‑DSS

Logging is where many e‑commerce sites drift out of compliance without realising it. Either they log too little and cannot reconstruct events, or they log too much and accidentally store sensitive data in plain text.

What you should log

PCI‑DSS expects you to log at least:

  • All authentication events: successful and failed logins for admin panels, SSH, database consoles and application backends
  • Changes to user privileges and roles
  • Configuration changes on firewalls, web servers, databases and key applications
  • Access to cardholder data or systems that process it
  • Security events, such as WAF blocks, intrusion detection alerts and malware scans

On a typical dchost.com VPS or dedicated server this means configuring logs from the OS, web server, database, application framework and security tools to flow into a central place where they can be retained and analysed.

What you must never log

At the same time, PCI‑DSS strictly forbids logging certain data elements in clear text, including:

  • Full PANs (Primary Account Numbers) unless they are encrypted and access is strictly limited
  • CVV/CVC codes
  • PINs or PIN blocks
  • Full magnetic stripe or chip data

Your application logs, access logs and debug output must be reviewed to ensure they do not accidentally contain these fields. Enable structured logging so you can drop or mask sensitive values before they hit disk.

Centralised logging and tamper resistance

PCI‑DSS requires that logs are protected from tampering and accessible for review. On the hosting side that translates into:

  • Shipping logs off each server to a central log server or logging cluster (for example via syslog or log shippers)
  • Restricting who can read and manage logs; administrators for the app should not automatically be able to delete logs that incriminate them
  • Using append‑only or versioned storage where possible, so deletion or modification attempts are obvious
  • Implementing alerting for critical events such as multiple failed logins, firewall rule changes or unexpected privilege escalations

We have a detailed walkthrough of centralised logging stacks in our article Centralising logs for multiple servers with ELK and Loki, and a VPS‑focused look at log pipelines in our VPS log management guide.

Log retention periods and compliance

PCI‑DSS typically expects you to retain certain logs for at least one year, with three months immediately available for analysis. At the same time, privacy regulations like GDPR and KVKK push you to avoid storing unnecessary personal data indefinitely.

Balancing these needs requires clear policies and technical enforcement. Our article Log retention on hosting and email infrastructure for KVKK/GDPR compliance explains how to define retention per log type, implement automatic deletion and still satisfy security and legal expectations.

In practice, you will usually store security and access logs longer than low‑level debug or performance logs, and you will regularly test that log rotation and archival are working as designed.

5. Backup, encryption and disaster recovery under PCI‑DSS

Backups are both a lifesaver and a potential liability. If you back up everything, including unencrypted databases and logs, and then lose those backups, you have effectively leaked your entire cardholder data environment. PCI‑DSS therefore treats backups as part of the CDE and applies the same controls.

Backup scope and frequency

For an e‑commerce hosting setup, you typically need to back up:

  • Application code and configuration, including environment files and secrets (preferably in an encrypted form)
  • Databases that hold orders, customer data and product catalogues
  • Uploaded media and assets that are not easily reproducible
  • Key configuration repositories such as infrastructure‑as‑code, Ansible playbooks or CI pipelines

A realistic starting point is daily full or incremental database backups, with more frequent binlog or WAL archiving if you need tighter RPOs (Recovery Point Objectives). Filesystem backups may be daily or hourly depending on how often content changes.

For a deeper dive into shaping RPO and RTO to your business, see our article How to design a backup strategy for blogs, e‑commerce and SaaS sites.

3‑2‑1 and offsite backups

The classic 3‑2‑1 rule fits PCI‑DSS nicely:

  • Keep at least 3 copies of your data (production plus two backups)
  • Store them on at least 2 different media or platforms (for example local snapshot + remote object storage)
  • Ensure at least 1 copy is offsite and not immediately accessible from production

On dchost.com this may mean a combination of on‑server snapshots for fast restores, dedicated backup storage in the same data center for quick recovery, and encrypted offsite backups to a separate region or provider in case of major incidents.

Encryption and access control for backups

Backups must be encrypted in transit and at rest. Practically this means:

  • Using TLS for all backup transports, whether you are sending data over SSH, HTTPS or S3‑compatible APIs
  • Encrypting backup archives with strong algorithms; if you use tools like restic or Borg, client‑side encryption is built in
  • Separating encryption keys from the backup storage location, with strict access control and rotation policies
  • Limiting who can restore from backups; not every developer should be able to fetch a full database with customer data

Finally, test restores are not optional. A backup that has never been restored is only a theory. Schedule regular, documented restore drills to verify that you can meet your RTO and that the restored environment boots cleanly and passes application health checks.

6. A practical PCI‑aware rollout plan on dchost.com

Let us put the pieces together into a concrete checklist you can adapt to your own e‑commerce project.

Step 1: Decide your payment flow and SAQ type

  • Choose between fully hosted payment pages (scope reduction, SAQ A) and on‑site payment forms that post directly to the gateway (SAQ A‑EP).
  • If you run WooCommerce, our article PCI‑DSS checklist for WooCommerce hosting walks through real‑world examples.
  • Document the exact path card data takes. Any system that can see or log it is in scope.

Step 2: Choose and segment your hosting

  • Select a VPS, dedicated server or colocated solution appropriate for your traffic and compliance level.
  • Plan at least logical segmentation between web frontends, application backends and databases; for higher assurance, use separate servers or VLANs.
  • Deploy a firewall with a default‑deny stance, opening only required ports, and consider adding a WAF in front of your store.

Step 3: Harden servers and deploy TLS correctly

  • Install a supported Linux distribution, remove unused packages and disable default/demo services.
  • Lock down SSH with key‑only auth, non‑root logins and restricted admin IP ranges or VPN.
  • Configure Nginx or Apache to serve only TLS 1.2/1.3 with strong ciphers and HSTS after testing.
  • Choose appropriate SSL certificates for your domains, using the guidance from our SSL certificate selection guide for e‑commerce.

Step 4: Implement structured logging and monitoring

  • Enable detailed but safe logs for the OS, web server, database and application, making sure no card data is written in clear text.
  • Forward logs to a central log server or logging stack with restricted access.
  • Define retention periods per log type, using the principles explained in our log retention guide.
  • Set up alerts for failed logins, permission changes, firewall rule updates and application‑level errors on checkout.

Step 5: Design and test a PCI‑aware backup and DR strategy

  • Identify all systems in PCI scope and ensure they are covered by regular, encrypted backups.
  • Apply the 3‑2‑1 rule with at least one offsite copy that cannot be directly reached from production.
  • Use separate credentials and keys for backup access, rotated on a schedule.
  • Run restore drills to a staging environment, verify data integrity and document the runbook. The RPO/RTO planning ideas in our backup strategy article are particularly useful here.

Step 6: Document and keep improving

  • Write down your hosting architecture, data flows, logging and backup policies in a short but clear internal document.
  • Review PCI‑DSS requirements annually or when you significantly change payment flows or hosting architecture.
  • Keep an eye on updates to TLS, browser behaviour and security best practices; our ongoing SSL/TLS and security posts on the dchost.com blog are designed to help you stay ahead of these changes.

7. Bringing it all together

PCI‑DSS can look intimidating from the outside, but once you break it down into concrete hosting tasks it becomes manageable. On the server side you need a clean, segmented architecture; hardened operating systems and services; modern TLS with the right certificate strategy; trustworthy logs; and encrypted, tested backups. On the organisational side you need documentation, access controls and a culture that treats cardholder data with the same care as cash in a physical store.

At dchost.com we see every day that merchants who invest a bit of effort early save themselves a lot of stress later. A carefully designed VPS, dedicated or colocation setup that respects PCI scope makes audits easier, incidents rarer and scaling more predictable. If you are planning a new e‑commerce project or want to bring an existing store closer to PCI‑DSS compliance, our team can help you choose the right hosting architecture and translate this guide into a concrete deployment plan on our infrastructure.

Start by mapping your payment flows, then review your servers, SSL/TLS, logs and backup strategy against the steps above. From there, we can fine‑tune capacity, high availability and performance together, so your store stays fast, secure and compliant as it grows.

Frequently Asked Questions

Not always. PCI‑DSS does not mandate a specific hosting product; it mandates controls. Very small stores using fully hosted payment pages and never touching card data can often stay on high‑quality shared hosting with SAQ A. As soon as your own domain serves payment forms or your application handles card data before tokenisation, you typically move to VPS, dedicated or colocation so you can control firewalls, logging, hardening and segmentation. The key is isolation and configurability: you must be able to lock down services, restrict access and prove it. For growing stores, a carefully designed VPS or small dedicated server is usually a practical sweet spot for both compliance and performance.

PCI‑DSS requires you to disable outdated protocols such as SSLv2, SSLv3, TLS 1.0 and TLS 1.1. Your web and API servers should support only TLS 1.2 and TLS 1.3, with strong cipher suites that provide forward secrecy. In practice that means using ECDHE key exchange with AES‑GCM or CHACHA20‑POLY1305 ciphers and disabling NULL, EXPORT, RC4 and other weak algorithms. You should also enable HSTS once you are confident all content loads correctly over HTTPS. Tools like SSL Labs and your own penetration tests can validate that your configuration meets modern expectations as well as PCI‑DSS requirements.

PCI‑DSS generally expects at least one year of security‑relevant logs, with three months immediately available for analysis. At the same time, you must avoid logging full card numbers, CVV/CVC codes, PIN data or full track data in clear text. The solution is structured, centralised logging with filtering: design your application logs so they never contain these fields, and mask or drop any sensitive values at the logging layer. Then ship logs to a central system with strict access control and defined retention per log type. Security and access logs can be kept longer, while verbose debug logs can be rotated out more aggressively to respect privacy regulations like GDPR and KVKK.

PCI‑DSS treats backups as part of the cardholder data environment, so they must be protected to the same standard as production. That means encrypting backups in transit and at rest, restricting who can access or restore them, and including backup systems in your access control and logging policies. From a strategy standpoint, aim for a 3‑2‑1 approach: at least three copies of your data, on two different media or platforms, with one offsite. Define clear RPO and RTO targets, back up all in‑scope databases and configurations regularly, and perform restore drills to confirm that you can actually recover within your objectives.

Scope reduction is one of the most effective ways to simplify PCI‑DSS compliance. You can keep using your own domain at checkout while reducing scope by using payment methods where card data is posted directly from the customer browser to the payment gateway, often via embedded iframes or JavaScript SDKs. In this model, your server never sees raw card data, so you typically qualify for SAQ A‑EP instead of heavier SAQs. You still need strong TLS, secure hosting, logging and backups, but you avoid storing or processing card numbers yourself. Carefully review your integration with the payment provider and ensure that no debug logs, proxies or custom code paths capture the card data in transit.