Cyber Security Blog

Stay ahead of the curve with industry trends, cutting edge tech and inventive strategies.

Ensuring PCI DSS Compliance: Penetration Testing Requirements Explained (Part 2)

Have you thought about how ready your organisation is to tackle the penetration testing requirements in PCI DSS v4.0.1?

In Part 1 of this series, we laid the groundwork for understanding PCI DSS (Payment Card Industry Data Security Industry) compliance and introduced Requirement 11.4. This focuses on the vital role penetration testing plays in keeping your Cardholder Data Environment (CDE) secure.

PCI DSS Logo

Now, in Part 2, we’re going a step further. We’ll break down each section of Requirement 11.4, showing you exactly what’s needed to meet compliance with confidence. Our aim? To make these requirements easy to understand and give you clear steps to follow so your organisation is always one step ahead.

Let’s jump back in!

What are the Penetration Testing requirements for PCI DSS?

The Penetration Testing Requirements: In our previous blog we delved into section 11.4, we will be taking a look at the remaining requirements that cover penetration compliance for Payment Card Industry Data Security Standard (PCI DSS) compliance.

Requirement: 11.4.2 Internal Penetration Testing For PCI:

This involves testing your organisation’s networks, systems, and applications that operate behind the scenes. The goal is to ensure that your internal infrastructure is secure—not just against potential insider threats, but also against hackers who manage to gain access to your systems.

Requirement: 11.4.3 External PCI DSS Penetration Testing

You will need to focus on external penetration testing. This ensures that any networks, servers, and applications exposed to the public are thoroughly evaluated for vulnerabilities.

Specific Requirements for Internal and External PCI Compliance Penetration Testing

To meet compliance, there are clear rules for how internal and external penetration testing should be conducted:

  • Be conducted at least once every 12 months.
  • Occur following any major upgrade or modification of infrastructure or applications.
  • Be carried out by a qualified internal resource or an external third-party tester.
  • Ensure organisational independence of the tester (they don’t need to be a QSA or ASV, but they must remain impartial).

Requirement 11.4.4: Addressing Vulnerabilities Found in PCI Penetration Testing

So, what happens when a penetration test uncovers vulnerabilities or security weaknesses? That’s where Requirement 11.4.4 comes in. This section focuses on how organisations should handle these issues and ensure they’re properly resolved. While it’s a short requirement, it’s a critical one—getting this right is essential for achieving compliance.

Here’s what you need to know:

  • Vulnerabilities need to be addressed in line with your organisation’s risk assessment (as outlined in Requirement 6.3.1, which we’ll cover shortly).
  • Once the corrections are made, penetration testing must be repeated to verify that the vulnerabilities have been properly fixed.

Requirement 6.3.1: Managing Vulnerabilities the Right Way

This requirement is all about ensuring vulnerabilities are handled systematically and effectively. Here are the key steps involved:

Requirement 11.4.5: Network Segmentation Testing For PCI Compliance

In Part 1 of this series, we talked about the Cardholder Data Environment (CDE) as the heart of your customer’s payment information. It’s where sensitive data is stored, processed, and transmitted. This information is not only valuable to your business and your customers but also a prime target for hackers looking to exploit it.

So, how can you better protect it? By segmenting your network.

Network segmentation testing involves separating the CDE from the rest of your organisation’s systems. This creates a secure “bubble” around your sensitive data, reducing the number of systems and devices that fall under the scope of PCI DSS compliance. In other words, you’re limiting what needs to meet compliance requirements, which makes managing security more straightforward and effective.

The Requirements You Need To Know About

If your organisation uses segmentation to isolate the Cardholder Data Environment (CDE), it’s essential to ensure those segmentation controls are tested regularly. Here’s what you need to know to stay compliant:

  • Organisational independence of the tester exists

Requirement 11.4.6: Additional Requirements for Service Providers

If your organisation uses a service provider, there’s an extra layer of responsibility to consider when it comes to compliance with Requirement 11.4.6.

What Is a Service Provider?

Service providers are organisations that handle cardholder data or provide critical services that could impact the security of your Cardholder Data Environment (CDE). Some common examples include:

  • Payment processors
  • Hosting providers
  • Managed IT services
  • Cloud storage providers
  • Data centres

Why Are Service Providers Held to a Higher Standard?

When you work with a service provider, you’re trusting them with sensitive data or systems. Because service providers often manage multiple clients’ data or critical infrastructure, they’re held to a higher standard in PCI DSS compliance. This means their penetration testing requirements are more rigorous to ensure the security of all their clients’ environments.

What Does 11.4.6 Require?

The requirements for service providers are similar to those for organisations managing their own cardholder data (requirement 11.4.5), but with one key difference: frequency.

Navigating PCI DSS Compliance UK Pen Testing: How We Can Help

The PCI DSS requirements, especially those around penetration testing, can feel overwhelming at first. But breaking them down into manageable steps, as we’ve done in this blog series, can make all the difference. By understanding the specifics of Requirement 11.4 and its sub-sections, you’re well on your way to ensuring your organisation is both compliant and secure.

Still have questions or need expert guidance? Our team of highly skilled penetration testers is here to help. Whether you’re navigating PCI DSS compliance or simply want to strengthen your overall security posture, we’re here to provide the support you need.

We also offer a free 30-minute consultation to answer any questions you might have and help you get started. Don’t hesitate to reach out to us at 0121 663 0055 or email us at enquiries@equilibrium-security.co.uk.

Ready to achieve your security goals? We’re at your service.

Whether you are a CISO, an IT Director or a business owner, Equilibrium has the
expertise to help you shape and deliver your security strategy.

About the author

Lucy Lawson is a Marketing Professional at Equilibrium Security, skilled in transforming complex Cyber Security challenges into clear, actionable advice. Her content is designed to guide your business in making informed Cyber Security decisions which follow best practice, ensuring your digital assets remain safe and secure.
Lucy Lawson
Marketing Assistant

Latest posts