
PCI DSS, the Payment Card Industry Data Security Standard, is the rulebook you have to follow if your system stores, processes, or transmits credit card data. The Professional Cloud Architect exam expects you to know how to design GCP workloads that stay inside that rulebook, and to know which services help you reduce the scope of what auditors actually have to inspect.
I want to walk through how I think about PCI DSS questions on the PCA, what tokenization buys you, and which GCP services show up in compliant designs.
PCI DSS is a set of strict controls for handling payment information. The standard covers things like network segmentation, encryption of cardholder data at rest and in transit, access control, audit logging, vulnerability management, and regular testing of security systems. If you handle a credit card number anywhere in your stack, the systems that touch that number fall into PCI scope, and you have to be able to prove you meet the controls for every one of them.
The key insight for exam questions is that PCI scope is something you actively manage. Every system that handles cardholder data is in scope. Every system that does not handle cardholder data is out of scope. So a major architectural goal is to shrink the set of systems that ever see a real card number.
The exam loves tokenization questions because tokenization is the cleanest way to cut PCI scope. Tokenization replaces a sensitive data element, like a credit card number, with a non-sensitive equivalent called a token. The token cannot be reversed back into the original card number without additional information held securely in a separate token vault.
Architecturally, you push the real card numbers into a small, tightly controlled tokenization service. Everything downstream, your analytics warehouse, your fraud models, your reporting dashboards, only ever sees tokens. Those downstream systems are no longer in PCI scope because they do not store or process actual cardholder data. You still get to analyze transaction trends and join data across systems by using the tokens as stable identifiers.
If you see a PCA question that asks how to let analysts query payment data without expanding the PCI footprint, tokenize the card numbers before the data lands in BigQuery and only store the tokenized version.
Google publishes a list of GCP services that customers have configured for PCI DSS compliance. The service itself does not make you compliant. You still have to configure it correctly, and you still have to bring your own controls. But these services support the configuration you need.
GKE is the canonical example on the exam. A PCI-compliant GKE configuration usually combines several controls. You use private clusters so the control plane and nodes are not exposed to the public internet. You use RBAC and Pod Security Standards to enforce access control inside the cluster. You enable encryption for data at rest and in transit, and you use network policies to restrict which pods can talk to which. You turn on audit logging, use Workload Identity for pod-to-GCP-service authentication, and run Shielded Nodes for boot integrity.
Other GCP services show up in PCI designs too:
When a PCA question describes a payment processing scenario, I work through it in this order. First, identify which components actually touch cardholder data. Second, look for ways to shrink that set, usually with tokenization. Third, for the components that remain in scope, pick GCP services that support encryption at rest and in transit, IAM-based access control, and audit logging. Fourth, wrap the in-scope projects with VPC Service Controls so data cannot leak across the boundary.
If the question is about protecting the public-facing endpoint, Cloud Armor and HTTPS Load Balancing are usually the right answer. If it is about restricting analyst access to card data, tokenization plus column-level security in BigQuery is usually the right answer. If it is about encryption keys, Cloud KMS with customer-managed keys is usually the right answer.
The Professional Cloud Architect exam will not test you on the full PCI DSS standard. It tests whether you can pick GCP services and configurations that match a PCI design pattern. Knowing the scope-reduction story and the short list of services above will get you through almost every PCI question.
My Professional Cloud Architect course covers PCI DSS compliance on GCP alongside the rest of the architecture and compliance material.