PCI DSS is the most prescriptive major compliance framework when it comes to penetration testing. While other standards leave testing frequency and methodology to the organization's judgment, PCI DSS 4.0 specifies exactly what tests must be run, how often, and what they must cover. If you store, process, or transmit cardholder data — or if your systems could affect the security of the cardholder data environment (CDE) — these requirements apply to you.
PCI DSS version 4.0 became the only active standard in March 2025, replacing version 3.2.1. Section 11.4 states that "external and internal penetration testing is regularly performed, and exploitable vulnerabilities and security weaknesses are corrected."
In concrete terms, this means:
One of the most important steps before any PCI DSS penetration test is correctly scoping the cardholder data environment. A scope that is too narrow misses real attack paths; a scope that is too broad wastes budget.
The CDE includes all system components that store, process, or transmit cardholder data (CHD) or sensitive authentication data (SAD), plus all systems that are connected to or could affect the security of those components. This typically includes:
Scope reduction through segmentation is one of the most effective ways to reduce PCI DSS compliance costs — but the segmentation must be verified to hold under attack. Q-Sec's penetration testing service includes segmentation validation as a standard component of PCI DSS engagements.
PCI DSS 4.0 requires a documented penetration testing methodology. Industry-standard methodologies that satisfy this requirement include:
The methodology must be applied consistently, documented, and available for review by a Qualified Security Assessor (QSA) during your PCI DSS assessment. Q-Sec provides methodology documentation as part of every engagement deliverable.
The test report is the primary evidence artifact for your QSA. It must include:
Q-Sec's reports are structured to meet QSA expectations directly. We have supported organizations through PCI DSS Level 1 and Level 2 assessments and understand what QSAs ask for. Reports are delivered in both technical detail (for your engineers) and executive summary format (for your QSA and management).
Many organizations subject to PCI DSS are also pursuing or maintaining ISO 27001 certification. The two frameworks share significant overlap in penetration testing requirements:
A well-scoped engagement can generate evidence for both frameworks simultaneously. Read our ISO 27001 penetration testing guide for the control mapping that makes this work. Q-Sec's compliance team can structure a single test program that satisfies PCI DSS Section 11.4 and ISO 27001 Annex A in one engagement.
PCI DSS does not explicitly mandate third-party penetration testers. However, it requires testers to be qualified and organizationally independent of the systems being tested. For most organizations, this means either using an external provider or a clearly independent internal security team. QSAs will scrutinize tester qualifications and independence. For Level 1 merchants and service providers, external testing from a recognized provider eliminates questions about independence.
PCI DSS requires both — and they are not interchangeable. Vulnerability scans (required quarterly under Section 11.3) identify known weaknesses through automated tools. Penetration tests (required annually under Section 11.4) go further: testers actively attempt to exploit identified vulnerabilities to demonstrate real-world risk. QSAs distinguish sharply between the two. Submitting scan reports when a pentest is required is a common compliance gap.
Q-Sec provides remediation guidance as part of every engagement report. For organizations that want active remediation support, our IT infrastructure services team can assist with patch management, configuration hardening, and network architecture adjustments. We also offer re-test engagements to formally close findings and provide QSA-ready evidence of remediation.
PCI DSS Section 11.4 penetration testing done right — scoped, executed, and reported for your QSA. Q-Sec, Rotterdam. Contact team@q-sec.com