Autonomous Audit Agents for PCI DSS 5.0: A Reinforcement Learning Approach

Authors

  • Aman Sardana Discover Financial Services, USA. Author
  • Vijaya Bhaskara Rao Kotapati Congnizant Technology Solutions, USA. Author
  • Sai Charan Ponnoju Fidelity Investments, USA. Author

DOI:

https://doi.org/10.60087/jklst.v4.n1.014

Abstract

Maintaining continuous compliance with the Payment Card Industry Data Security Standard (PCI DSS) 5.0 remains a critical challenge due to evolving threats and system changes that lead to compliance drift between annual audits. This paper introduces autonomous audit agents leveraging reinforcement learning (RL) to address this gap. The proposed agents perform real-time inspection of control telemetry, dynamically map collected evidence to PCI DSS requirements, and autonomously generate remediation pull-requests to rectify deviations. A simulated sandbox environment, replicating multi-stakeholder payment ecosystems (acquirer, processor, and merchant systems), validates the approach, demonstrating a 92% acceleration in detecting compliance deviations and 30% reduction in audit-related costs compared to traditional methods. The results highlight the potential of RL-driven automation to enhance compliance sustainability, reduce manual intervention, and improve operational efficiency in payment card security frameworks.

Downloads

Download data is not yet available.

References

. Qualys. (2023). PCI DSS Compliance Manager.

. Kumar, R., et al. (2022). ML-Driven PCI Audit-ing. IEEE Access.

. Nguyen, T., et al. (2021). RL for IoT Anomaly Detection. Computers & Security.

. Lee, J., et al. (2020). Adaptive Firewalls with RL. ACM CCS.

. DeepMind. (2022). AlphaCyber: Autonomous Threat Response. arXiv.

. AWS. (2023). Auto-Remediation Documenta-tion.

. Chen, Y., et al. (2023). Self-Healing Micro-services. IEEE Transactions on Services Computing.

. PCI Security Standards Council. PCI DSS v5.0: Requirements and Testing Procedures. 2023. [Online]. Available: https://www.pcisecuritystandards.org

. A. Paszke et al., “PyTorch: An Imperative Style, High-Performance Deep Learning Library,” Adv. Neural Inf. Process. Syst. (NeurIPS), vol. 32, pp. 8024–8035, 2019.

. G. Brockman et al., “OpenAI Gym,” arXiv:1606.01540, 2016.

. J. Devlin et al., “BERT: Pre-training of Deep Bidirectional Transformers for Language Under-standing,” Proc. NAACL, pp. 4171–4186, 2019.

. IBM Security. Cost of a Data Breach Report 2023. IBM, 2023. [Online]. Available: https://www.ibm.com/security/data-breach

. S. Lundberg and S. Lee, “A Unified Approach to Interpreting Model Predictions,” Proc. NeurIPS, pp. 4765–4774, 2017.

. PCI Security Standards Council. PCI DSS Compliance Penalty Guidelines. 2022. [Online]. Available: https://www.pcisecuritystandards.org/pdfs/pci_dss_compliance_penalties.pdf

. J. Schulman et al., “Proximal Policy Optimiza-tion Algorithms,” arXiv:1707.06347, 2017.

. Netflix Engineering Blog. “Chaos Engineering: Building Confidence in System Resilience.” 2022. [Online]. Available: https://netflixtechblog.com

. Y. Li et al., “Federated Learning: Challenges, Methods, and Future Directions,” IEEE Signal Pro-cess. Mag., vol. 37, no. 3, pp. 50–60, 2020.

. M. Abadi et al., “TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems,” arXiv:1603.04467, 2016.

. R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction, 2nd ed. MIT Press, 2018.

. L. Deng et al., “Automated Compliance Checking

Downloads

Published

10-02-2025

How to Cite

Sardana, A., Kotapati, V. B. R. ., & Ponnoju, S. C. . (2025). Autonomous Audit Agents for PCI DSS 5.0: A Reinforcement Learning Approach. Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online), 4(1), 130-136. https://doi.org/10.60087/jklst.v4.n1.014