PCI-DSS Penetration Testing: Requirements, Scope, and What Assessors Look For | Lorikeet Security Skip to main content
Back to Blog

PCI-DSS Penetration Testing: Requirements, Scope, and What Assessors Look For

PCI-DSS is one of the few compliance frameworks that explicitly requires penetration testing. There is no ambiguity, no "security testing or equivalent," and no room for interpretation. Requirement 11.4 mandates it. Your Qualified Security Assessor will ask for the report. If the report does not meet the standard's expectations, you will have a finding on your Report on Compliance.

And yet, organizations routinely fail the penetration testing requirement. Not because they skip it entirely, but because the scope is wrong, the methodology does not cover what PCI-DSS expects, or the report does not address the specific areas the QSA needs to validate. This guide covers exactly what PCI-DSS v4.0 requires from penetration testing, what your QSA is actually evaluating, and how to avoid the mistakes that cause compliance failures.

PCI-DSS v4.0 Penetration Testing Requirements: Requirement 11.4

PCI-DSS v4.0, which became mandatory on March 31, 2025, restructured and clarified the penetration testing requirements that previously lived under Requirement 11.3 in PCI-DSS v3.2.1. The requirements now sit under Requirement 11.4, and they are more explicit about what testing must cover.

Here is what Requirement 11.4 specifies at a high level:

The key word in every sub-requirement is "defined." PCI-DSS v4.0 wants documentation at every step. Your methodology must be documented. Your scope must be documented. Your retesting must be documented. The QSA is not just checking that you ran a pentest; they are checking that you have a repeatable, documented process around it.

Important v4.0 change: PCI-DSS v4.0 no longer allows compensating controls for penetration testing. In previous versions, organizations could argue that alternative measures addressed the intent of the requirement. Under v4.0, penetration testing is a non-negotiable requirement. You must perform it as specified, or you will not pass your assessment.

Internal vs. External Penetration Testing

PCI-DSS requires both internal and external penetration testing, and the distinction matters. These are not interchangeable, and performing only one will result in a compliance gap.

External Penetration Testing

Simulates an attacker on the internet targeting your public-facing systems. Covers external IP addresses, web applications, APIs, VPN endpoints, email gateways, and any other services exposed to the internet that are in scope for PCI-DSS. The goal is to determine whether an external attacker can breach the CDE perimeter.

Internal Penetration Testing

Simulates a threat actor who has already gained access to your internal network. Tests lateral movement from non-CDE segments into the CDE, privilege escalation within internal systems, access control weaknesses, and the effectiveness of network segmentation. This is where most critical findings appear.

Why Internal Testing Matters More Than You Think

Many organizations focus their security budget on external defenses and treat internal testing as an afterthought. In the PCI-DSS context, this is backwards. The standard explicitly requires internal testing because the most devastating breaches start from the inside, whether through compromised credentials, a phishing attack that gives an attacker a foothold, or a malicious insider.

Internal penetration testing for PCI-DSS should specifically cover:

Scoping the Cardholder Data Environment

Getting the scope right is the single most important factor in a successful PCI-DSS penetration test. Scope it too narrowly and your QSA will reject the report. Scope it too broadly and you are spending money testing systems that do not matter for compliance. The CDE definition drives everything.

What Is the CDE?

The Cardholder Data Environment encompasses all people, processes, and technologies that store, process, or transmit cardholder data, plus any systems that are directly connected to or that could impact the security of those systems. In practice, this means:

Scoping Mistakes That Cause Failures

Scope validation tip: Before your pentest begins, have your QSA review and approve the penetration testing scope. This avoids the scenario where you complete testing, submit the report, and the QSA determines that the scope was insufficient. A thirty-minute scoping call can save you from having to redo the entire engagement.

Network Segmentation Testing

If your organization uses network segmentation to reduce PCI-DSS scope, Requirement 11.4.5 requires that you specifically test the effectiveness of that segmentation. This is not optional. If you claim segmentation reduces your scope, you must prove it works.

What Segmentation Testing Involves

Segmentation testing is distinct from general penetration testing. It specifically validates that systems outside the CDE cannot reach systems inside the CDE through any network path. The testing must verify:

Service Provider Requirements: Semi-Annual Testing

If you are a service provider, Requirement 11.4.6 mandates segmentation testing at least every six months, not annually. This increased frequency reflects the higher risk that service providers represent in the payment ecosystem. Service providers must also retest segmentation after any changes to segmentation controls or methods, regardless of when the last scheduled test occurred.

Application-Layer Testing Requirements

PCI-DSS penetration testing is not just about network infrastructure. Requirement 11.4 explicitly requires application-layer testing for any custom or bespoke applications that are part of the CDE. This means your payment applications, web applications that handle cardholder data, APIs that transmit payment information, and any custom software involved in the payment process.

What Application-Layer Testing Must Cover

PCI-DSS v4.0 references the OWASP Top 10 and requires that application-layer testing address, at a minimum, the following areas:

If your organization uses a third-party payment application (such as an off-the-shelf POS system), the application itself may be validated under PA-DSS or the PCI Software Security Framework. However, your configuration and deployment of that application is still in scope for penetration testing. A validated application deployed insecurely is still a vulnerability.

Frequency Requirements: Annual and After Significant Changes

PCI-DSS requires penetration testing at two distinct triggers:

Annual Testing

Both internal and external penetration testing must be performed at least once every 12 months. The testing must fall within your current assessment period. If your QSA comes for your annual assessment and your most recent pentest report is 14 months old, it will not satisfy the requirement, even if it was valid for the previous assessment period.

After Significant Changes

Penetration testing must also be performed after any "significant change" to the environment. PCI-DSS v4.0 provides guidance on what constitutes a significant change, but the definition ultimately depends on the organization's change management process and risk assessment. Common triggers include:

What counts as "significant"? PCI-DSS v4.0 expects organizations to define their own criteria for significant changes as part of their change management process (Requirement 6.5.2). Your QSA will review this definition during the assessment. If you define "significant change" too loosely, you may miss required testing triggers. If you define it too strictly, you may end up testing constantly. Work with your QSA to establish a reasonable threshold.

What the QSA Actually Looks for in Your Pentest Report

Your QSA is not a casual reader. They are reviewing your penetration test report against a specific set of criteria defined in the PCI-DSS ROC (Report on Compliance) Reporting Template. Here is what they are verifying:

1. Documented Testing Methodology

The QSA will check that your penetration test follows a documented, industry-accepted methodology. Acceptable methodologies include NIST SP 800-115, the OWASP Testing Guide, PTES (Penetration Testing Execution Standard), and CREST methodologies. The report must reference the methodology used and demonstrate that the testing followed it systematically. A report that reads like ad-hoc vulnerability scanning will not pass.

2. Complete CDE Coverage

The QSA compares the pentest scope against your documented CDE. Every system, application, and network segment in the CDE must be covered. If your network diagram shows 15 systems in the CDE and the pentest report only references 8, the QSA will ask about the missing 7. The report must explicitly list all in-scope assets and confirm that they were tested.

3. Both Network-Layer and Application-Layer Testing

A pentest that only covers network infrastructure is insufficient. A pentest that only covers web applications is also insufficient. PCI-DSS requires both. The QSA will verify that the report includes network-layer testing (port scanning, service enumeration, vulnerability exploitation, lateral movement) and application-layer testing (OWASP Top 10 coverage, authentication testing, authorization testing, business logic testing).

4. Testing from Both Inside and Outside the Network

The QSA will verify that external testing was performed against all public-facing CDE assets and that internal testing was performed from within the network. If the report only shows external testing, the QSA will flag the gap. Some organizations try to submit two separate reports from two different vendors, one for external and one for internal. While this is acceptable, it is cleaner and more cost-effective to have a single vendor cover both perspectives.

5. Segmentation Validation

If your scope is reduced through segmentation, the QSA will specifically look for segmentation testing results. They will verify that the testing confirmed the segmentation is effective and that no unauthorized paths exist between the CDE and out-of-scope networks. Missing segmentation validation is one of the most common reasons QSAs reject pentest reports.

6. Remediation and Retesting Evidence

For any exploitable vulnerabilities found, the QSA wants to see evidence that they were remediated and retested. PCI-DSS Requirement 11.4.4 explicitly states that "exploitable vulnerabilities and security weaknesses found during penetration testing are corrected and testing is repeated to verify the corrections." A report that lists findings but includes no retesting evidence is incomplete.

7. Tester Qualifications

The QSA will verify that the penetration testing was performed by a qualified individual or organization. PCI-DSS v4.0 requires that the tester be "qualified" and notes that this can be demonstrated through industry certifications (OSCP, GPEN, CEH, CREST), relevant experience, or organizational accreditation. Internal teams can perform the testing, but organizational independence must be maintained, meaning the tester cannot be responsible for the systems being tested.

Common PCI-DSS Pentest Failures and How to Avoid Them

Having worked with organizations across multiple industries on PCI-DSS compliance, these are the failure patterns we see most frequently:

ASV Scanning vs. Penetration Testing: Requirement 11.3 vs. 11.4

One of the most frequent points of confusion in PCI-DSS is the difference between ASV scanning and penetration testing. They are separate requirements, serve different purposes, and are not interchangeable.

Criteria ASV Scanning (Req. 11.3.2) Penetration Testing (Req. 11.4)
What it is Automated external vulnerability scanning performed by a PCI-approved scanning vendor (ASV) Manual, human-driven security testing that attempts to exploit vulnerabilities
Frequency At least quarterly At least annually and after significant changes
Scope External-facing IP addresses and domains Entire CDE: internal, external, applications, network, segmentation
Methodology Automated scanning with PCI ASV program requirements Manual testing following NIST, OWASP, PTES, or equivalent methodology
Who performs it PCI-approved ASV vendor only Qualified internal or external tester with organizational independence
Output Pass/fail scan report with vulnerability listings Detailed report with exploitation evidence, risk analysis, and remediation guidance
Passing criteria No vulnerabilities scoring 4.0 or above on CVSS All exploitable vulnerabilities remediated and retested

Both requirements must be satisfied independently. Passing your quarterly ASV scans does not satisfy the penetration testing requirement, and a clean penetration test does not exempt you from ASV scanning. Think of ASV scanning as your ongoing health check and penetration testing as the annual comprehensive exam.

Internal Vulnerability Scanning (Requirement 11.3.1)

In addition to external ASV scanning and penetration testing, PCI-DSS also requires internal vulnerability scanning at least quarterly (Requirement 11.3.1). Internal scans can be performed by qualified internal staff or a third party and do not need to be performed by an ASV. However, internal vulnerability scans are still not a substitute for internal penetration testing. Scanning identifies potential vulnerabilities. Penetration testing validates whether they are exploitable and assesses the actual risk.

Working with Your Pentest Vendor for PCI Compliance

Choosing the right penetration testing vendor for PCI-DSS is not the same as choosing a vendor for general security testing. The engagement needs to be structured specifically for PCI compliance, and your vendor needs to understand what the QSA expects.

What to Look for in a PCI Pentest Vendor

Before the Engagement: What to Provide Your Vendor

To ensure your PCI pentest is scoped correctly and covers everything the QSA needs, provide your vendor with the following before testing begins:

PCI-DSS 4.0 Changes That Affect Pentest Requirements

PCI-DSS v4.0 introduced several changes that directly impact how penetration testing must be performed. If you were compliant under v3.2.1, do not assume your existing process will satisfy v4.0 without review.

Customized Approach

PCI-DSS v4.0 introduces the "customized approach" as an alternative to the traditional "defined approach." Under the customized approach, organizations can meet the intent of a requirement through alternative means, provided they can demonstrate equivalent or better security outcomes. For penetration testing, this means an organization could theoretically propose a different testing methodology or frequency if they can demonstrate it meets the requirement's objective. However, in practice, most QSAs expect traditional penetration testing, and the customized approach requires significantly more documentation and justification. For most organizations, following the defined approach for Requirement 11.4 is the path of least resistance.

Authenticated Internal Vulnerability Scanning

While not a penetration testing requirement per se, PCI-DSS v4.0 Requirement 11.3.1.2 introduces authenticated internal vulnerability scanning as a best practice until March 31, 2025, after which it becomes mandatory. This means internal scans must use credentials to log into systems and identify vulnerabilities that are not visible to unauthenticated scans. This change often surfaces additional findings that should be included in the scope of subsequent penetration testing.

Multi-Tenant Service Provider Requirements

PCI-DSS v4.0 adds new requirements for multi-tenant service providers (Requirement 11.4.7, effective March 31, 2025). Service providers that host multiple customers must support their customers' penetration testing and provide evidence that logical separation between tenant environments is effective. If you are a multi-tenant service provider, your penetration testing must validate tenant isolation, and you must be prepared to make testing evidence available to your customers and their QSAs.

Targeted Risk Analysis for Testing Frequency

PCI-DSS v4.0 introduces the concept of targeted risk analysis (Requirement 12.3.1) to determine the frequency of certain security activities. While the minimum frequency for penetration testing remains annual, organizations are expected to perform a risk analysis to determine whether more frequent testing is warranted based on their threat landscape, rate of change, and previous findings. Your QSA may ask to see this risk analysis as part of the assessment.

Building a PCI-DSS Penetration Testing Program

Rather than treating penetration testing as an annual compliance checkbox, organizations that consistently pass PCI-DSS assessments build a structured, repeatable testing program. Here is what that looks like:

Annual Planning

Change-Triggered Testing

In parallel with the annual cycle, maintain a process for evaluating whether changes to your environment trigger a penetration testing requirement. This process should be documented in your change management procedures and should include clear criteria for what constitutes a "significant change" in your environment. When a change meets the threshold, engage your vendor for a targeted test focused on the affected systems.

Continuous Improvement

Track your findings over time. Are the same types of vulnerabilities appearing year after year? If so, you have a systemic issue that needs to be addressed through training, process improvements, or technology changes. Your QSA will look favorably on organizations that demonstrate a downward trend in findings over multiple assessment periods, as it shows that the testing program is driving actual security improvement, not just checking a compliance box.

A QSA's perspective: The organizations that have the smoothest PCI-DSS assessments are the ones that treat penetration testing as a continuous program rather than an annual event. They scope with the QSA before testing, remediate promptly, retest thoroughly, and maintain clean documentation throughout the year. When assessment time comes, there are no surprises on either side.

Frequently Asked Questions

Can we use our internal security team for PCI-DSS penetration testing?

Yes, but with conditions. The testers must be qualified (through certifications, training, or demonstrated experience) and must have organizational independence from the CDE they are testing. This means the person performing the test cannot be responsible for managing, administering, or securing the systems being tested. Many organizations find it simpler and more defensible to use a qualified third party.

How long does a PCI-DSS penetration test typically take?

The duration depends on the size and complexity of the CDE. A small e-commerce environment might require 5 to 7 days of testing. A large enterprise with multiple payment channels, extensive infrastructure, and complex segmentation could require 3 to 4 weeks. Retesting typically adds 1 to 3 additional days depending on the number of findings.

What happens if we fail the penetration test?

There is no pass or fail in the traditional sense. A penetration test identifies vulnerabilities. What matters for PCI-DSS is how you respond. Exploitable vulnerabilities must be remediated and retested (Requirement 11.4.4). As long as you remediate findings and can demonstrate through retesting that they are resolved, the initial findings do not cause a compliance failure. The failure scenario is when findings are identified and not remediated or retested.

Do we need to pentest systems managed by our payment processor?

Generally, no. Systems managed entirely by your payment processor fall under their PCI-DSS compliance, not yours. However, the connection points between your environment and the processor's environment are in your scope. Your pentest should test the security of those integration points, including the network connection, API authentication, data transmission encryption, and access controls on your side of the boundary.

Is a pentest required for SAQ merchants?

It depends on the SAQ type. SAQ A and SAQ A-EP merchants generally do not have a penetration testing requirement if they fully outsource payment processing and meet the eligibility criteria. SAQ C and SAQ D merchants do have penetration testing requirements. If you are unsure which SAQ applies to your environment, consult your acquirer or QSA. Getting the wrong SAQ type is a common source of compliance issues.

PCI-DSS Penetration Testing by Lorikeet

QSA-ready reports, CDE scope alignment, segmentation validation, and retesting included. We work directly with your assessor to ensure your pentest satisfies every element of Requirement 11.4.

View PCI Pentest Details Book a Consultation
-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!