Tech Insight | PCI Compliance

PCI Penetration Testing Requirements

PCI DSS 4.0.1
Requirement 11.4
Updated 2026
Cybersecurity compliance controls and governance visualization with red highlighted risk areas

PCI penetration testing is not optional for organizations that must protect cardholder data. PCI DSS Requirement 11.4 requires internal and external penetration testing to be performed regularly, exploitable vulnerabilities to be corrected, and testing to follow a documented methodology.

The mistake many organizations make is treating PCI penetration testing like a checkbox. A weak test may satisfy a procurement step, but it can fail to prove whether the Cardholder Data Environment is truly protected. The goal is audit readiness and real validation: scope the right systems, test the right attack paths, prove segmentation, remediate findings, and document the evidence your assessor needs.

Internal and external testing

PCI DSS requires testing from both inside and outside the network to validate realistic attack paths.

Segmentation must be proven

If segmentation is used to reduce PCI scope, it must be tested and documented as effective.

Reports must support audit

Your report needs scope, methodology, findings, evidence, remediation, and retest validation.

PCI compliance does not mean your environment is secure unless the test proves it.

PCI penetration testing should validate whether attackers can reach systems that store, process, or transmit cardholder data. That requires more than scanning. It requires a defined methodology, internal and external testing, segmentation validation where applicable, remediation, and documentation that can stand up during assessment.

For core service scope, see Redbot’s penetration testing services and internal network penetration testing pages.

What PCI DSS requires for penetration testing

PCI DSS 4.0.1 places penetration testing under Requirement 11.4, which focuses on regularly performed internal and external penetration testing and correction of exploitable vulnerabilities and security weaknesses. The intent is to validate that the Cardholder Data Environment and connected systems are protected against realistic attack paths.

PCI DSS also expects a documented methodology. That methodology should define scope, testing approach, coverage, segmentation validation, remediation verification, and how findings are reported. If your organization relies on segmentation to reduce PCI scope, the penetration test must validate that segmentation controls actually isolate the CDE.

PCI penetration testing scope: what must be included?

The biggest PCI penetration testing failure is bad scope. If the scope is too narrow, the test may miss systems that can impact cardholder data. If segmentation is assumed but not proven, the effective PCI scope may be much larger than expected.

A strong PCI test starts by identifying the CDE, connected systems, supporting infrastructure, authentication paths, remote access, cloud services, applications, APIs, and network paths that could influence the security of cardholder data.

Cardholder Data Environment: systems that store, process, or transmit cardholder data.
Connected systems: services, networks, identities, APIs, and management paths that can affect the CDE.
Segmentation controls: firewalls, VLANs, access controls, routing, identity boundaries, and cloud security groups used to reduce scope.
Applications and APIs: payment workflows, admin portals, integrations, customer interfaces, and anything that touches cardholder data flows.

Internal vs external PCI penetration testing

PCI penetration testing must account for both external and internal attack perspectives. External testing validates exposure from the internet. Internal testing validates what happens if an attacker gains a foothold through phishing, credential theft, vendor access, endpoint compromise, or another internal entry point.

PCI Internal and External Testing Comparison

Both perspectives matter because attackers do not stop at the perimeter.

Testing TypeWhat It ValidatesWhy It Matters for PCI
External penetration testingInternet-facing systems, remote access, exposed services, web applications, APIs, and perimeter weaknesses.Shows whether an outside attacker can reach systems connected to cardholder data or gain an initial foothold.
Internal penetration testingLateral movement, privilege escalation, segmentation bypass, identity abuse, and access to sensitive internal systems.Shows whether a compromised user or internal foothold can reach the CDE or supporting systems.
Segmentation testingWhether controls separating the CDE from other networks and systems are effective.Supports scope reduction and helps prove that non-CDE systems cannot reach protected payment environments.
For service-level detail, see Redbot’s external penetration testing and internal network penetration testing pages.

PCI segmentation testing: the failure point most teams underestimate

Segmentation is often used to reduce PCI scope by separating the CDE from the rest of the environment. But segmentation only helps if it actually works. PCI testing needs to validate that systems outside the CDE cannot reach protected payment systems through network paths, access controls, identity paths, routing, firewall rules, cloud permissions, or management interfaces.

If segmentation fails, the organization may have a larger PCI scope than expected. That can create audit risk, remediation pressure, and a much bigger compliance burden.

Assumed segmentation

The organization believes the CDE is isolated because diagrams, VLANs, firewalls, or policies say it should be.

Validated segmentation

The test proves whether systems outside the CDE can actually reach CDE assets or supporting services.

What a PCI-ready penetration testing methodology should include

PCI DSS expects a defined methodology, not an improvised test. The methodology should be based on accepted industry approaches and should clearly explain how the testing team plans, scopes, executes, documents, and verifies the engagement.

Defined scope

CDE systems, connected systems, critical systems, segmentation boundaries, applications, APIs, and cloud components.

Internal and external testing

Testing from outside the network and from an internal or assumed-breach perspective.

Exploit validation

Safe validation of exploitable vulnerabilities, attack paths, and security weaknesses.

Remediation and retesting

Documented correction of exploitable findings and verification that fixes worked.

What an audit-ready PCI penetration testing report should include

The report matters. A strong report helps the QSA understand what was tested, how it was tested, what was found, what was corrected, and whether exploitable weaknesses were retested. A weak report can create problems even if the testing itself was useful.

Scope and assumptions: CDE assets, connected systems, exclusions, testing windows, and segmentation boundaries.
Methodology: internal and external approach, tools used, manual validation, and standards followed.
Findings and evidence: proof of exploitability, impact, affected systems, screenshots, reproduction detail, and severity.
Remediation guidance: practical fixes mapped to affected systems, risk, and priority.
Retesting results: validation that exploitable vulnerabilities and security weaknesses were corrected.

Common PCI penetration testing failures

Most PCI penetration testing problems come from scope, evidence, or depth. Organizations may run a test but fail to include all relevant systems, skip segmentation validation, rely too heavily on automated scanning, or lack retesting documentation.

Too narrow scope

Critical connected systems, APIs, cloud resources, or identity paths are left out of the test.

Scanner-only evidence

The report lists potential vulnerabilities but does not prove exploitability or realistic impact.

Segmentation assumptions

Controls are treated as effective without testing whether they actually isolate the CDE.

No retest trail

Findings are remediated informally without documented validation that the issues were corrected.

How Redbot approaches PCI penetration testing

Redbot focuses on PCI penetration testing that is practical, evidence-driven, and assessor-friendly. The work is designed to help teams validate real risk while producing documentation that supports PCI assessment expectations.

That means clearly defining scope, validating internal and external exposure, testing segmentation where applicable, documenting attack paths, prioritizing remediation, and supporting retesting after fixes are applied.

Manual validation beyond automated scanner output.
Internal and external testing aligned to CDE risk.
Segmentation testing for PCI scope reduction claims.
Audit-ready reporting with evidence, remediation, and retest results.

PCI penetration testing FAQs

Is penetration testing required for PCI DSS?

Yes. PCI DSS Requirement 11.4 requires internal and external penetration testing to be performed regularly and exploitable vulnerabilities and security weaknesses to be corrected.

How often is PCI penetration testing required?

PCI DSS requires penetration testing regularly, including after significant changes. Many organizations align testing to an annual cadence plus additional testing after material changes that affect the CDE or connected systems.

Does vulnerability scanning count as PCI penetration testing?

No. Vulnerability scanning and penetration testing are different activities. PCI penetration testing requires validation of exploitable weaknesses and realistic attack paths, not only detection of potential issues.

Is segmentation testing required for PCI?

If segmentation is used to reduce PCI scope, it must be validated. The test should prove that systems outside the CDE cannot reach protected cardholder data systems through allowed or unintended paths.

The Redbot takeaway

PCI penetration testing is not just a compliance formality. It is the evidence layer that helps prove whether your payment environment is actually protected from realistic attack paths.

Redbot helps organizations scope PCI testing correctly, validate internal and external exposure, test segmentation, document exploitable findings, and support remediation with audit-ready evidence.

Need PCI penetration testing that can stand up to audit?

Redbot Security helps organizations validate PCI scope, test internal and external attack paths, prove segmentation, document findings, and support remediation with audit-ready evidence.