PCI DSS v4.0 Segmentation Testing: Requirement 11.4.5, Methodology, and What Your QSA Expects | Lorikeet Security Skip to main content
Back to Blog

PCI DSS v4.0 Segmentation Testing: What It Actually Involves and Why Most Companies Fail It

Lorikeet Security Team February 26, 2026 10 min read

Segmentation testing is one of the most misunderstood requirements in PCI DSS. Every organization we work with believes their Cardholder Data Environment is properly isolated. They point to their firewall rules, their VLAN architecture, their cloud security groups. They have network diagrams that show clean lines between the CDE and everything else. The segmentation looks solid on paper.

Then we test it.

In our experience performing PCI segmentation validation across industries, we find segmentation failures in roughly seven out of ten environments on the first engagement. Not theoretical failures or documentation gaps, but actual network paths that allow traffic from non-CDE segments into the CDE. Firewall rules that look restrictive until you test the specific port ranges. VLANs that share infrastructure in ways nobody documented. Cloud security groups that were correct when deployed but drifted over time as teams made exceptions for operational convenience.

PCI DSS v4.0 Requirement 11.4.5 exists precisely because segmentation is hard to get right and even harder to maintain. If your organization uses network segmentation to reduce PCI scope, and nearly every organization does, this requirement is not optional. Your QSA will ask for the report. If the report does not exist, or if it does not demonstrate that segmentation is effective, your scope expands to include every system that was supposed to be out of scope. That is a materially different assessment, a materially different cost, and a materially different compliance timeline.

This guide covers what PCI DSS v4.0 actually requires for segmentation testing, what the testing methodology looks like in practice, the failures we find most often, and how to prepare your environment so that testing confirms your segmentation rather than disproving it.


What PCI DSS v4.0 Says About Segmentation Testing

Network segmentation is not a PCI DSS requirement. Nothing in the standard says you must segment your network. What the standard says is that if you choose to use segmentation to reduce the scope of your PCI DSS assessment, you must prove that the segmentation actually works. That proof comes from testing.

Requirement 11.4.5: The Core Mandate

Requirement 11.4.5 in PCI DSS v4.0 states that if segmentation is used to isolate the CDE from other networks, penetration testing is performed on segmentation controls to verify that they are operational and effective. This requirement applies to all entities that use segmentation, whether merchants or service providers.

The requirement is specific about what "operational and effective" means in practice:

What Changed from v3.2.1 to v4.0

Under PCI DSS v3.2.1, segmentation testing existed under Requirement 11.3.4 with similar intent but less specificity. PCI DSS v4.0 made several important changes:

Service Provider Semi-Annual Requirement

Requirement 11.4.6 applies specifically to service providers and mandates segmentation testing at least once every six months, not annually. This increased frequency reflects the elevated risk that service providers carry in the payment ecosystem. Service providers process or store cardholder data on behalf of multiple merchants, and a segmentation failure at a service provider can impact every merchant they serve.

The semi-annual requirement also applies after any changes to segmentation controls or methods, regardless of when the last scheduled test occurred. If a service provider modifies firewall rules, reconfigures VLANs, changes cloud network architecture, or makes any other change that affects how the CDE is isolated, segmentation testing must be repeated.


What Segmentation Testing Actually Involves

This is where the most significant misunderstanding exists. Segmentation testing is not a vulnerability scan. It is not a firewall rule review. It is not a network diagram audit. While all of those activities have value, none of them satisfy Requirement 11.4.5 on their own.

Segmentation testing is an active, hands-on validation that segmentation controls block unauthorized traffic between the CDE and all other network segments. Here is what the methodology looks like in practice.

Step 1: Identifying All CDE Boundaries and Data Flows

Before any testing begins, the tester must understand the architecture. This means reviewing network diagrams, data flow diagrams, firewall rule sets, VLAN configurations, and cloud security architecture. The goal is to identify every point where the CDE boundary exists, including every system that stores, processes, or transmits cardholder data and every network control that enforces isolation around those systems.

This scoping exercise is critical because segmentation testing is only valid if it covers all boundaries. Testing three of four CDE entry points and missing the fourth means the segmentation has not been validated. Common boundaries include:

Step 2: Testing from Non-CDE Segments into the CDE

From each non-CDE network segment, the tester attempts to reach systems within the CDE. This is not a simple ping test. The tester performs comprehensive port scanning, service discovery, and protocol-level testing to determine whether any traffic can traverse the segmentation boundary. The testing covers:

Step 3: Testing from CDE Segments Outward

Segmentation must be effective in both directions. From within the CDE, the tester attempts to reach non-CDE systems and networks. This bidirectional testing catches scenarios where egress rules are more permissive than ingress rules, a common configuration error. An attacker who has compromised a CDE system should not be able to use it as a pivot point to reach the broader corporate network.

Step 4: Validating That Segmentation Blocks ALL Unauthorized Traffic

The key word is "all." Segmentation testing is a negative proof exercise. The tester must demonstrate that no unauthorized path exists, not merely that some paths are blocked. This requires methodical, comprehensive testing across every segment boundary, every protocol, and every port range. A passing segmentation test is one where the tester attempted to cross every boundary through every reasonable method and was blocked every time.

Step 5: Application-Level Segmentation Testing

Network-level segmentation is necessary but not always sufficient. Application-level segmentation must also be validated where it is used as a segmentation control. This includes:

Step 6: Wireless Segmentation Validation

If your environment includes wireless networks, segmentation testing must validate that wireless segments cannot reach the CDE. This includes testing whether a device connected to the corporate wireless network can communicate with CDE systems, whether rogue access points could bridge wireless and wired CDE networks, and whether wireless management interfaces are properly isolated.


Segmentation Approaches Compared

Not all segmentation strategies are equal. The approach you take directly impacts your PCI scope, your risk profile, and the cost and complexity of your assessment.

Criteria Flat Network (No Segmentation) Segmented with Validation Segmented Without Validation
PCI Scope Entire network is in scope. Every system, workstation, server, and device is subject to PCI DSS requirements. Only CDE systems and directly connected systems are in scope. Non-CDE segments are excluded from assessment. Entire network defaults to in scope. Without validated segmentation, the QSA cannot accept a reduced scope claim.
Compliance Risk Extremely high. Every system must meet PCI DSS controls, making compliance across a large environment practically unmanageable. Manageable. Compliance requirements apply to a well-defined, contained set of systems with proven boundaries. Very high. The organization believes scope is reduced, but the QSA will expand scope during assessment, creating unexpected gaps.
Breach Blast Radius Maximum. A compromise anywhere in the network gives the attacker access to cardholder data. Contained. A compromise in a non-CDE segment does not directly expose cardholder data if segmentation is effective. Unknown. The organization assumes blast radius is contained, but untested segmentation may have gaps that allow lateral movement.
Assessment Cost Highest. Assessors must evaluate every system in the environment, dramatically increasing time and expense. Lowest achievable. Focused scope means fewer systems to assess, shorter timelines, and lower fees. Can end up highest. If the QSA rejects segmentation during assessment, the scope expands mid-engagement, causing delays and additional cost.
Audit Complexity Overwhelming for large environments. Maintaining PCI DSS compliance across hundreds or thousands of systems requires enormous ongoing effort. Streamlined. Documentation, monitoring, and control maintenance focus on a defined set of CDE systems. Chaotic. The organization has invested in segmentation infrastructure but cannot demonstrate its effectiveness, creating confusion during audit.

The middle column, segmented with validation, is the only approach that actually delivers scope reduction. The third column is where most organizations find themselves before their first segmentation test. They have invested in the infrastructure but have not invested in proving it works.


Common Segmentation Failures We Find

These are not theoretical risks. These are findings from our segmentation testing engagements, anonymized but representative of what we encounter regularly across industries.

A pattern we see repeatedly: organizations invest significantly in perimeter segmentation, building strong firewall rules between their CDE VLAN and corporate VLAN, but completely overlook the shared infrastructure that ties those segments together. The firewall between segments is airtight. But Active Directory, DNS, NTP, and monitoring traffic flows freely across both segments through a shared services VLAN that nobody thought to include in the segmentation model.


The Semi-Annual Testing Requirement in Practice

For service providers, Requirement 11.4.6 mandates segmentation testing at least every six months. For merchants using segmentation, Requirement 11.4.5 mandates annual testing at minimum. In practice, both cadences require planning, budgeting, and operational coordination.

Scheduling and Cadence

The most practical approach is to align segmentation testing with your broader PCI penetration testing schedule. Many organizations combine segmentation testing with their annual or semi-annual penetration test engagement, since the same testing team typically performs both. This reduces coordination overhead and ensures that the testing vendor has full context of both the segmentation architecture and the broader CDE environment.

For service providers on a semi-annual cadence, a common schedule is:

Changes That Trigger Additional Testing

Both Requirements 11.4.5 and 11.4.6 require testing after changes to segmentation controls or methods. In practice, the following changes should trigger a segmentation retest:

Documentation Requirements

Your QSA will expect documentation that covers the complete testing lifecycle:


Cloud Segmentation Challenges

Segmentation in cloud environments introduces complexities that do not exist in traditional data center architectures. The abstraction layers that make cloud infrastructure flexible also make segmentation harder to reason about and harder to validate.

AWS VPC Segmentation

In AWS, the primary segmentation unit is the Virtual Private Cloud (VPC). A properly segmented PCI environment typically places CDE workloads in a dedicated VPC with its own security groups, network ACLs, and route tables. Common segmentation failures in AWS include:

Azure VNet Segmentation

Azure uses Virtual Networks (VNets) as the primary segmentation construct. CDE workloads should reside in a dedicated VNet with Network Security Groups (NSGs) enforcing traffic policies. Azure-specific segmentation challenges include:

GCP VPC Segmentation

Google Cloud uses a global VPC model where subnets span regions. This is fundamentally different from AWS and Azure where VPCs/VNets are regional constructs. GCP-specific segmentation considerations include:

Container and Kubernetes Segmentation

Organizations running CDE workloads in Kubernetes face an additional layer of segmentation complexity. By default, all pods in a Kubernetes cluster can communicate with all other pods. This means a non-CDE workload running in the same cluster as a CDE workload has unrestricted network access to it unless Kubernetes NetworkPolicies are explicitly configured.

Segmentation testing in containerized environments must validate:


Preparing for a Segmentation Test

The organizations that pass segmentation testing on the first attempt are the ones that prepare thoroughly. The documentation you provide to your testing vendor directly impacts the quality and efficiency of the engagement. Here is what you should have ready.

Industry data point: Organizations that implement and validate proper network segmentation reduce their PCI DSS assessment scope by 40-60% on average, translating directly to lower assessment costs, shorter audit timelines, and a dramatically reduced compliance burden. The investment in segmentation testing pays for itself many times over compared to the cost of assessing an unsegmented environment.


Frequently Asked Questions

What is PCI DSS segmentation testing?

PCI DSS segmentation testing is a specialized security assessment that validates whether network segmentation controls effectively isolate the Cardholder Data Environment from all other network segments. Unlike a general penetration test, segmentation testing specifically verifies that no unauthorized network paths exist between CDE and non-CDE segments, that segmentation controls block all unauthorized protocols and ports in both directions, and that out-of-band access paths like management networks and backup connections do not inadvertently bridge segmented environments. It is required under PCI DSS v4.0 Requirement 11.4.5 for any organization that uses segmentation to reduce PCI scope.

How often does PCI DSS v4.0 require segmentation testing?

For merchants, Requirement 11.4.5 requires segmentation testing at least once every 12 months and after any changes to segmentation controls or methods. For service providers, Requirement 11.4.6 increases the frequency to at least once every six months, plus after any changes to segmentation controls. Any significant infrastructure change that could affect segmentation should trigger additional testing regardless of when the last scheduled test occurred.

What is the difference between segmentation testing and a penetration test?

A penetration test simulates a real-world attack against your environment, attempting to exploit vulnerabilities across network and application layers to assess overall security posture. Segmentation testing is a focused validation that specifically confirms network segmentation controls are functioning as intended. It does not attempt to exploit application-level vulnerabilities or escalate privileges. Instead, it methodically tests every network path between CDE and non-CDE segments to confirm that unauthorized traffic is blocked. PCI DSS requires both: a full penetration test under Requirement 11.4.1-11.4.4 and segmentation validation under Requirement 11.4.5. Many organizations combine them into a single engagement, but they serve distinct purposes.

Can you use segmentation to reduce PCI DSS scope?

Yes, and it is one of the most effective strategies for managing PCI DSS compliance cost and complexity. By properly isolating systems that store, process, or transmit cardholder data from the rest of your network, you limit the number of systems subject to PCI DSS requirements. However, segmentation only reduces scope if it is properly implemented and validated through testing. If testing reveals that segmentation is not working as intended, all connected systems fall back into scope, potentially making the assessment significantly larger and more expensive. The investment in proper segmentation and regular validation testing consistently proves to be the most cost-effective approach to PCI DSS compliance for organizations with complex network environments.

Need PCI Segmentation Testing?

Lorikeet Security performs PCI DSS segmentation validation testing that satisfies Requirement 11.4.5, including full boundary testing, bidirectional validation, cloud segmentation assessment, and QSA-ready reporting. We work directly with your assessor to ensure the report meets every documentation requirement.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!