11.4: 1. A penetration testing methodology is defined, documented, and implemented by the entity, and includes: (a) Industry-accepted penetration testing approaches, (b) Coverage for the entire CDE perimeter and critical systems, (c) Testing from both inside and outside the network, (d) Testing to validate any segmentation and scope- reduction controls, (e) Application-layer penetration testing to identify, at a minimum, the vulnerabilities listed in Requirement 6.2.4, (f) Network-layer penetration tests that encompass all components that support network functions as well as operating systems, (g) Review and consideration of threats and vulnerabilities experienced in the last 12 months, (h) Documented approach to assessing and addressing the risk posed by exploitable vulnerabilities and security weaknesses found during penetration testing, (i) Retention of penetration testing results and remediation activities results for at least 12 months.
  • Examine documentation and interview personnel to verify that the penetration-testing methodology defined, documented, and implemented by the entity includes all elements specified in this requirement.

Description

Purpose

Attackers spend a lot of time finding external and internal vulnerabilities to leverage to obtain access to cardholder data and then to exfiltrate that data. As such, entities need to test their networks thoroughly, just as an attacker would do. This testing allows the entity to identify and remediate weakness that might be leveraged to compromise the entity’s network and data, and then to take appropriate actions to protect the network and system components from such attacks.

Good Practice

Penetration testing techniques will differ based on an organization’s needs and structure and should be suitable for the tested environment—for example, fuzzing, injection, and forgery tests might be appropriate. The type, depth, and complexity of the testing will depend on the specific environment and the needs of the organization.

Definitions

Penetration tests simulate a real-world attack situation intending to identify how far an attacker could penetrate an environment, given differing amounts of information provided to the tester. This allows an entity to better understand its potential exposure and develop a strategy to defend against attacks. A penetration test differs from a vulnerability scan, as a penetration test is an active process that usually includes exploiting identified vulnerabilities.Scanning for vulnerabilities alone is not a penetration test, nor is a penetration test adequate if the focus is solely on trying to exploit vulnerabilities found in a vulnerability scan. Conducting a vulnerability scan may be one of the first steps, but it is not the only step a penetration tester will perform to plan the testing strategy. Even if a vulnerability scan does not detect known vulnerabilities, the penetration tester will often gain enough knowledge about the system to identify possible security gaps.

Penetration testing is a highly manual process. While some automated tools may be used, the tester uses their knowledge of systems to gain access into an environment. Often the tester will chain several types of exploits together with the goal of breaking through layers of defenses. For example, if the tester finds a way to gain access to an application server, the tester will then use the compromised server as a point to stage a new attack based on the resources to which the server has access. In this way, a tester can simulate the techniques used by an attacker to identify areas of potential weakness in the environment. The testing of security monitoring and detection methods—for example, to confirm the effectiveness of logging and file integrity monitoring mechanisms, should also be considered.#### Further Information Refer to the Information Supplement: Penetration Testing Guidance for additional guidance.

Industry-accepted penetration testing approaches include:

The Open Source Security Testing Methodology and Manual (OSSTMM)

Open Web Application Security Project (OWASP) penetration testing programs.

11.4: 2. Internal penetration testing is performed: (a) Per the entity’s defined methodology,, (b) At least once every 12 months, (c) After any significant infrastructure or application upgrade or change, (d) By a qualified internal resource or qualified external third-party, (e) Organizational independence of the tester exists (not required to be a QSA or ASV).
  • Examine the scope of work and results from the most recent internal penetration test to verify that penetration testing is performed in accordance with all elements specified in this requirement.
  • Interview personnel to verify that the internal penetration test was performed by a qualified internal resource or qualified external third-party and that organizational independence of the tester exists (not required to be a QSA or ASV).

Description

Purpose

Internal penetration testing serves two purposes. Firstly, just like an external penetration test, it discovers vulnerabilities and misconfigurations that could be used by an attacker that had managed to get some degree of access to the internal network, whether that is because the attacker is an authorized user conducting unauthorized activities, or an external attacker that had managed to penetrate the entity’s perimeter.

Secondly, internal penetration testing also helps entities to discover where their change control process failed by detecting previously unknown systems. Additionally, it verifies the status of many of the controls operating within the CDE.

A penetration test is not truly a “test” because the outcome of a penetration test is not something that can be classified as a “pass” or a “fail.” The best outcome of a test is a catalog of vulnerabilities and misconfigurations that an entity did not know about, and the penetration tester

11.4: 3. External penetration testing is performed: (a) Per the entity’s defined methodology, (b) At least once every 12 months, (c) After any significant infrastructure or application upgrade or change, (d) By a qualified internal resource or qualified external third party, (e) Organizational independence of the tester exists (not required to be a QSA or ASV).
  • Examine the scope of work and results from the most recent external penetration test to verify that penetration testing is performed according to all elements specified in this requirement.
  • Interview personnel to verify that the external penetration test was performed by a qualified internal resource or qualified external third party and that organizational independence of the tester exists (not required to be a QSA or ASV).

Description

Purpose

found them before an attacker could. A penetration test that found nothing is typically indicative of shortcomings of the penetration tester, rather than being a positive reflection of the security posture of the entity.

Good Practice

Some considerations when choosing a qualified resource to perform penetration testing include:

• Specific penetration testing certifications, which may be an indication of the tester’s skill level and competence.

• Prior experience conducting penetration testing—for example, the number of years of experience, and the type and scope of prior engagements can help confirm whether the tester’s experience is appropriate for the needs of the engagement.

Further Information

Refer to the Information Supplement: Penetration Testing Guidance on the PCI SSC website for additional guidance.

11.4: 4. Exploitable vulnerabilities and security weaknesses found during penetration testing are corrected as follows: (a) In accordance with the entity’s assessment of the risk posed by the security issue as defined in Requirement 6.3.1, (b) Penetration testing is repeated to verify the corrections.
  • Examine penetration testing results to verify that noted exploitable vulnerabilities and security weaknesses were corrected in accordance with all elements specified in this requirement.

Description

Purpose

The results of a penetration test are usually a prioritized list of vulnerabilities discovered by the exercise. Often a tester will have chained a number of vulnerabilities together to compromise a system component. Remediating the vulnerabilities found by a penetration test significantly reduces the probability that the same vulnerabilities will be exploited by a malicious attacker.

Using the entity’s own vulnerability risk assessment process (see requirement 6.3.1) ensures that the vulnerabilities that pose the highest risk to the entity will be remediated more quickly.

Good Practice

As part of the entity’s assessment of risk, entities should consider how likely the vulnerability is to be exploited and whether there are other controls present in the environment to reduce the risk.

Any weaknesses that point to PCI DSS requirements not being met should be addressed.

11.4: 5. If segmentation is used to isolate the CDE from other networks, penetration tests are performed on segmentation controls as follows: (a) At least once every 12 months and after any changes to segmentation controls/methods, (b) Covering all segmentation controls/methods in use, (c) According to the entity’s defined penetration testing methodology, (d) Confirming that the segmentation controls/methods are operational and effective, and isolate the CDE from all out-of-scope systems, (e) Confirming effectiveness of any use of isolation to separate systems with differing security levels (see Requirement 2.2.3), (f) Performed by a qualified internal resource or qualified external third party, (g) Organizational independence of the tester exists (not required to be a QSA or ASV).
  • Examine segmentation controls and review penetration-testing methodology to verify that penetration-testing procedures are defined to test all segmentation methods in accordance with all elements specified in this requirement.
  • Examine the results from the most recent penetration test to verify the penetration test covers and addresses all elements specified in this requirement.
  • Interview personnel to verify that the test was performed by a qualified internal resource or qualified external third party and that organizational independence of the tester exists (not required to be a QSA or ASV).

Description

Purpose

When an entity uses segmentation controls to isolate the CDE from internal untrusted networks, the security of the CDE is dependent on that segmentation functioning. Many attacks have involved the attacker moving laterally from what an entity deemed an isolated network into the CDE. Using penetration testing tools and techniques to validate that an untrusted network is indeed isolated from the CDE can alert the entity to a failure or misconfiguration of the segmentation controls, which can then be rectified.

Good Practice

Techniques such as host discovery and port scanning can be used to verify out-of-scope segments have no access to the CDE.

11.4: 6. Additional requirement for service providers only: If segmentation is used to isolate the CDE from other networks, penetration tests are performed on segmentation controls as follows: (a) At least once every six months and after any changes to segmentation controls/methods, (b) Covering all segmentation controls/methods in use, (c) According to the entity’s defined penetration testing methodology, (d) Confirming that the segmentation controls/methods are operational and effective, and isolate the CDE from all out-of-scope systems, (e) Confirming effectiveness of any use of isolation to separate systems with differing security levels (see Requirement 2.2.3), (f) Performed by a qualified internal resource or qualified external third party, (g) Organizational independence of the tester exists (not required to be a QSA or ASV).
  • Additional testing procedure for service provider assessments only: Examine the results from the most recent penetration test to verify that the penetration covers and addressed all elements specified in this requirement.
  • Additional testing procedure for service provider assessments only: Interview personnel to verify that the test was performed by a qualified internal resource or qualified external third party and that organizational independence of the tester exists (not required to be a QSA or ASV).

Description

Purpose

Service providers typically have access to greater volumes of cardholder data or can provide an entry point that can be exploited to then compromise multiple other entities. Service providers also typically have larger and more complex networks that are subject to more frequent change. The probability of segmentation controls failing in complex and dynamic networks is greater in service-provider environments.

Validating segmentation controls more frequently is likely to discover such failings before they can be exploited by an attacker attempting to pivot laterally from an out-of-scope untrusted network to the CDE.

Good Practice

Although the requirement specifies that this scope validation is carried out at least once every six months and after significant change, this exercise should be performed as frequently as possible to ensure it remains effective at isolating the CDE from other networks.

11.4: 7. Additional requirement for multi-tenant service providers only: Multi-tenant service providers support their customers for external penetration testing per Requirement 11.4.3 and 11.4.4.
  • Additional testing procedure for multi- tenant service providers only: Examine evidence to verify that multi-tenant service providers support their customers for external penetration testing per Requirement 11.4.3 and 11.4.4.

Description

Purpose

Entities need to conduct penetration tests in accordance with PCI DSS to simulate attacker behavior and discover vulnerabilities in their environment. In shared and cloud environments, the multi-tenant service provider may be concerned about the activities of a penetration tester affecting other customers’ systems.

Multi-tenant service providers cannot forbid penetration testing because this would leave their customers’ systems open to exploitation. Therefore, multi-tenant service providers must support customer requests to conduct penetration testing or for penetration testing results.