When it comes to protecting cardholder data, the Payment Card Industry Data Security Standard (PCI DSS) is the global baseline. Companies that store, process, or transmit credit card information must follow PCI requirements—and one of the most misunderstood requirements is the need for a penetration test (pentest).
While many organizations assume that scanning for vulnerabilities is enough, PCI DSS is very clear: depending on your PCI level, an annual penetration test is mandatory, and it must complement (not replace) the vulnerability scans performed by an Approved Scanning Vendor (ASV).
In this article, we’ll break down why pentesting is essential, how it relates to ASV scans, and what a high‑quality pentest report should look like so you can get real value—not just another checkbox.
Pentesting vs. ASV Scanning: Understanding the Difference
PCI requires both vulnerability scanning and penetration testing, but they are not the same thing.
ASV Scans
- Must be performed quarterly by a PCI‑approved scanning vendor.
- Automatically identify known vulnerabilities based on signatures.
- Focus on externally accessible systems.
- Produce a pass or fail result for compliance.
ASV scanning helps maintain a secure baseline, but its scope is limited, and the output is mostly technical findings with minimal context.
Penetration Testing
- Required annually, or after significant changes to your environment (per PCI DSS v4.0).
- Conducted by skilled security professionals simulating real attackers.
- Includes manual testing, not just automated tools.
- Focuses on how vulnerabilities can be chained together to compromise systems or data.
- Provides strategic insights that scanning alone cannot deliver.
Think of ASV scans as routine health checks, while a pentest is a full diagnostic—to understand not only where issues exist, but how an attacker might use them.
Why the Annual Pentest Is Mandatory
PCI DSS requirements vary depending on the merchant level, but all levels that handle card data must demonstrate proper security testing.
Specifically:
PCI DSS v4.0 Requirement 11.4
Organizations must perform:
- Internal and external penetration testing at least annually
- Testing after any significant infrastructure or application change
- Segmentation testing (if used to reduce PCI scope)
These tests are not optional. They are designed to prove that:
- Your systems can withstand real‑world attacks.
- Your PCI segmentation actually isolates cardholder data.
- Your ASV scan findings have been validated or further explored.
How Pentesting Complements ASV Scanning
A strong PCI compliance program combines automated and manual assessments.
| ASV Scans | Penetration Testing |
|---|---|
| Automated | Manual + automated |
| Quarterly | Annual or after major changes |
| Finds vulnerabilities | Exploits vulnerabilities |
| Checks external-facing assets | Covers internal, external, and segmentation |
| Compliance-driven | Security-driven |
ASV scans show what is vulnerable; pentesting shows what an attacker can actually do with those vulnerabilities.
Combining both gives your organization a realistic picture of its security posture—something PCI auditors expect and rely on.
What a Good Pentest Report Should Contain
Not all pentest reports are created equal. A weak report wastes time, fails audits, and provides little actionable value. A strong report, on the other hand, becomes a roadmap for improving your security maturity.
A professional, PCI‑aligned pentest report should include:
1. Executive Summary
- Clear, non‑technical explanation of objectives, approach, and high‑level results.
- Business impact descriptions, not just technical jargon.
2. Methodology
- Reference to standards such as OSSTMM, NIST, or OWASP.
- Scope details: systems, applications, IP ranges, authentication levels.
3. Detailed Findings
For each finding:
- Description of the vulnerability
- Proof of exploitation
- Actual business impact
- Step-by-step reproduction steps
- Evidence (screenshots, logs, requests/responses)
- Risk rating (e.g., CVSS)
4. Remediation Guidance
- Clear, actionable steps—not generic advice.
- Prioritized recommendations to help your team plan efficiently.
5. Validation of Segmentation (If Applicable)
If segmentation is used to limit PCI scope, the pentest must:
- Verify isolation of cardholder data.
- Attempt to break segmentation controls.
6. Re‑test Results
PCI requires validation that fixes were applied correctly.
A solid provider includes retesting to confirm remediation.
What You Should Expect From a Professional Pentesting Provider
When choosing a pentesting partner for PCI compliance, look for teams that:
- Have experience specifically with PCI DSS environments.
- Combine automated tools with manual exploitation.
- Understand how to test segmentation effectively.
- Produce reports that are meaningful for both your technical teams and your PCI QSA.
- Provide ongoing support, remediation validation, and guidance.
At the end of the day, the goal is not just to pass an audit—it’s to understand your real risks and strengthen your organization’s security posture.
Final Thoughts
A penetration test isn’t just another PCI requirement. It’s one of the most powerful tools organizations have to uncover real risks before attackers do.
By understanding how pentests differ from ASV scans, why they’re mandatory, and what a quality report should deliver, your organization can make informed decisions and significantly improve its resilience.
If you’re planning your next compliance cycle or simply want to tighten your security controls, knowing what to expect from a pentest is the first step.