PCI DSS Penetration Testing: A Practical Compliance Guide
Here is a conversation we have more often than we would like to admit. We are on a call with an organization that processes payment cards, and we ask how they are tracking against PCI DSS. The response comes back fast and confident: "Oh, we are good. We have an ASV doing our quarterly scans."
Great. That is genuinely a good start. Then comes the follow up.
"What does your internal and external PCI penetration testing program look like?"
Silence. Sometimes a polite cough. Occasionally a "wait, that is a separate thing?"
Yes, it is a separate thing. And if you are subject to the Payment Card Industry Data Security Standard, it is not optional. PCI DSS penetration testing is one of the most misunderstood requirements in the entire standard, partly because so many teams assume their vulnerability scanning checks the box. It does not. The two activities are related, but they are not the same, and the consequences for confusing them range from a failed Report on Compliance to an actual cardholder data breach.
In this guide we walk through what PCI DSS penetration testing is, what PCI DSS Requirement 11.4 actually demands under PCI DSS 4.0, how a PCI pen test differs from a regular pen test, and what to look for when you are vetting a PCI penetration testing firm.
What Is PCI DSS Penetration Testing?
A PCI DSS penetration test is a controlled, methodical testing of the systems, networks, and applications that store, process, or transmit cardholder data, plus everything connected to that environment. The objective is straightforward. A qualified ethical hacker tests your defenses the same way a real adversary would probing configurations, identifying weaknesses, moving through your environment, and documenting exactly how a breach could unfold inside your cardholder data environment, or CDE, as well as at the external perimeter of your organization.
Unlike automated vulnerability scanning, PCI penetration testing requires people. Trained, creative, certified people who think like adversaries. If you have ever sat in a debrief with a seasoned tester, you know the feeling. They will walk you through a chain of three or four findings, none of them critical on their own, that together would have handed an attacker your entire payment environment. That is the kind of insight an automated tool will not give you.
PCI penetration testing is required under PCI DSS Requirement 11.4 (formerly 11.3 in PCI DSS 3.2.1). Falling out of compliance carries real consequences, including increased card brand fees, mandatory forensic audits after an incident, and in some cases the loss of your ability to process card payments at all.
PCI Penetration Testing vs. Vulnerability Scanning
This is the source of most of the confusion, so it is worth slowing down. A vulnerability scan and a PCI pen test do different jobs.
A vulnerability scan is automated. A tool runs against your environment, identifies known vulnerabilities, ranks them by severity, and produces a report. PCI DSS Requirement 11.3 mandates internal and external vulnerability scans on a quarterly cadence and after any significant change. External scans must be performed by an Approved Scanning Vendor, or ASV. Scans are quick, repeatable, and great at surface-level coverage.
A PCI penetration test is manual. A qualified human tester uses the output of a scan as a starting point, then attempts to exploit findings, chain them together, escalate privileges, and reach cardholder data. PCI DSS Requirement 11.4 requires this kind of testing at least annually and after any significant infrastructure or application change. Pen tests typically run for days or weeks depending on scope, and the deliverable is a narrative report documenting how each vulnerability was exploited, with proof of concept evidence and prioritized remediation guidance.
The simplest way to think about it: vulnerability scanning tells you that a door is unlocked. PCI penetration testing demonstrates what an attacker can do once they walk through it.
You need both. PCI DSS does not let you choose.
PCI DSS 11.4 Penetration Testing Requirements Under PCI DSS 4.0
PCI DSS 4.0 (and the current 4.0.1 update) reorganized and clarified the penetration testing requirements that lived under 11.3 in PCI DSS 3.2.1. The intent is largely the same, but the language is tighter and the expectations are more explicit. Here is what a compliant PCI penetration testing program looks like today.
Requirement 11.4.1 - Defined methodology. You must have a documented penetration testing methodology that is based on industry-accepted approaches such as NIST SP 800-115, OSSTMM, OWASP, or PTES. Scope, rules of engagement, and documentation expectations all need to be written down before testing begins.
Requirement 11.4.2 - Internal penetration testing. Testing from inside the network, into and across the CDE, must be performed at least once every twelve months and after any significant change to the environment. This catches what an insider or an already-compromised foothold would be able to reach.
Requirement 11.4.3 - External penetration testing. Testing from the internet against your perimeter, public-facing systems, and any infrastructure that exposes services to untrusted networks must also occur annually and after significant change.
Requirement 11.4.4 - Remediation and retest. Exploitable vulnerabilities discovered during a PCI pen test must be corrected, and the corrections must be verified through a retest. PCI DSS expects all critical and high-rated internal vulnerabilities to be remediated, plus all critical, high, and medium vulnerabilities on externally facing systems.
Requirement 11.4.5 - Segmentation testing for merchants. If you rely on segmentation controls, like firewalls or VLANs, to keep parts of your network out of scope, you must validate that those controls actually work. Merchants test segmentation at least annually.
Requirement 11.4.6 - Segmentation testing for service providers. Service providers face a stricter cadence and must validate segmentation every six months and after any change to segmentation controls.
Requirement 11.4.7 - Multi-tenant providers. Multi-tenant service providers must support customer penetration testing of the customer-facing environment.
Add to that the broader 11.x family. Quarterly internal and external vulnerability scans under 11.3, wireless network scanning under 11.2, payment page tamper detection under 11.6, and authenticated internal scans under 11.3.1.2. PCI DSS 4.0 also strengthens application-layer testing under Requirement 6.4. Public-facing web applications and APIs must be evaluated annually and after significant changes.
Internal, External, and Segmentation Testing Explained
The three pillars of PCI penetration testing each address a different attack scenario.
External pen testing simulates an attacker coming at you from the internet. Web applications, APIs, exposed services, and remote access points are all in scope. This is where attacks like Magecart-style e-skimming and credential stuffing live, and it is where your perimeter is most directly exposed.
Internal pen testing simulates what happens once the perimeter is breached or an insider acts maliciously. Testers operate from inside the trusted network and try to reach the CDE, escalate privileges, and exfiltrate cardholder data.
Segmentation testing validates that the controls separating in-scope from out-of-scope networks are actually doing their job. Testers are placed in supposedly out-of-scope segments and attempt to pivot into the CDE. If they succeed, those networks come back into PCI scope until you fix the segmentation.
Each test answers a different question. Skipping any of them leaves a gap an assessor will find.
PCI Penetration Testing Methodology
Mature PCI penetration testing firms follow a recognized methodology rather than improvising. The PCI Security Standards Council explicitly references several in its Penetration Testing Guidance. The most common include:
-
NIST SP 800-115, the U.S. government technical guide to information security testing and assessment
-
OWASP Testing Guide and the OWASP Application Security Verification Standard (ASVS), which dominate web application and API testing
-
OSSTMM (Open Source Security Testing Methodology Manual) for operational security testing across networks
-
PTES (Penetration Testing Execution Standard), which provides end-to-end coverage from pre-engagement through reporting
-
ISSAF (Information Systems Security Assessment Framework) for mapping technical findings to business risk
A typical PCI pen test engagement moves through pre-engagement (scoping and rules of engagement), reconnaissance, scanning, vulnerability discovery, exploitation, post-exploitation and pivoting, then reporting and retesting. The deliverable should include an executive summary, scope and methodology statements, a testing narrative, segmentation results, vulnerability findings with risk ratings and proof of concept, tools used, cleanup instructions, and remediation evidence after retesting.
If your last pen test report was three pages of generic scan output, that was not a PCI penetration test. That was a vulnerability scan with a fancy cover sheet.
Black-Box, White-Box, and Grey-Box Testing
PCI penetration tests typically combine all three approaches. Black-box testing gives the tester nothing but an IP range or URL, mirroring an external attacker with no inside knowledge. White-box testing provides the tester with full documentation, credentials, and architecture diagrams, which produces the most thorough technical coverage. Grey-box testing splits the difference, providing limited information so the tester can validate specific concerns without spending the budget on pure reconnaissance.
A good PCI penetration testing firm will recommend a blend that fits the size, complexity, and risk profile of your CDE.
Who Is Qualified to Perform a PCI Pen Test?
PCI DSS does not require that your tester be a Qualified Security Assessor or an ASV, but it does require they be qualified. That means demonstrated experience as a penetration tester and, ideally, recognized certifications such as OSCP, GIAC GPEN, GWAPT, or CEH. The tester also needs organizational independence from the systems being tested. Internal teams can technically perform PCI penetration testing, but they cannot test systems they manage, support, or maintain. For most organizations, hiring a third-party PCI penetration testing firm is cleaner, faster, and easier to defend during a Report on Compliance review.
How Often, How Long, and How Much
Three questions come up on every PCI penetration testing scoping call. Here are the honest answers.
How often: at least annually, plus after any significant change to your environment. Service providers run segmentation testing every six months. After a major application release, a network re-architecture, or a cloud migration, plan on testing again.
How long: most engagements run from a few days to several weeks. Scope, environment size, and methodology drive the timeline. A small e-commerce environment may wrap in a week. A multi-region service provider with multiple applications is comfortably a multi-week engagement.
How much: PCI penetration testing typically ranges from around five thousand dollars on the low end to forty thousand or more for large, complex environments. The cheapest quote you receive is rarely the right one. The cost of a bad pen test is the breach you discover later.
What to Look for in a PCI Penetration Testing Firm
Not every firm marketing PCI pen test services delivers the depth PCI DSS expects. When you are comparing providers, ask the following:
-
Will the engagement be performed by certified, experienced testers, or handed off to junior staff after the kickoff call?
-
Does the firm follow a documented methodology mapped to NIST, OWASP, OSSTMM, or PTES?
-
Can they share a sanitized sample report so you can evaluate the depth of findings, narrative, and remediation guidance?
-
Do they include segmentation testing aligned to PCI DSS 11.4.5 or 11.4.6, and application layer testing aligned to 6.4?
-
Is retesting included in the engagement so you can confirm remediation worked?
-
Are they comfortable defending the methodology and findings to your QSA?
If any of those answers are vague, keep looking.
Compass IT Compliance Performs PCI Penetration Testing the Way the Standard Intends
Quarterly ASV scans are a starting line, not a finish line. Real PCI compliance, the kind that holds up to a QSA review and, more importantly, to an actual attacker, requires PCI penetration testing performed by qualified humans against a properly scoped CDE.
Our team brings certified ethical hackers, a documented methodology aligned to PCI DSS 4.0 expectations, and reporting a QSA will accept on the first read. Whether you need external testing, internal testing, segmentation testing, application layer testing under Requirement 6.4, or all of the above, we will scope the engagement to your environment and walk you through every finding.
If your last conversation about pen testing ended in silence, let us help you fill it in. Reach out for a scoping call and we will map a PCI penetration testing program that satisfies the standard and actually makes you safer.
Contact Us
Share this
You May Also Like
These Related Stories

Penetration Testing: Black Box vs. White Box vs. Gray Box

Is Your Internal Pen Test Just a Glorified Vulnerability Scan?

.webp?width=2169&height=526&name=Compass%20white%20blue%20transparent%202%20website%20(1).webp)
-1.webp?width=2169&height=620&name=Compass%20regular%20transparent%20website%20smaller%20(1)-1.webp)
No Comments Yet
Let us know what you think