Skip to main content

๐Ÿ’ผ 11.3 Implement a methodology for penetration testing.

Descriptionโ€‹

Includes the following:

  • Is based on industry-accepted penetration testing approaches (for example, NIST SP800-115)
  • Includes coverage for the entire CDE perimeter and critical systems
  • Includes testing from both inside and outside the network
  • Includes testing to validate any segmentation and scope-reduction controls
  • Defines application-layer penetration tests to include, at a minimum, the vulnerabilities listed in Requirement 6.5
  • Defines network-layer penetration tests to include components that support network functions as well as operating systems
  • Includes review and consideration of threats and vulnerabilities experienced in the last 12 months
  • Specifies retention of penetration testing results and remediation activities results.

Similarโ€‹

  • Sections
    • /frameworks/pci-dss-v4.0/11/04/01
  • Internal
    • ID: dec-c-3cd8dff5

Similar Sections (Take Policies From)โ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ PCI DSS v4.0 โ†’ ๐Ÿ’ผ 11.4.1 A penetration testing methodology is defined, documented, and implemented by the entity.

Similar Sections (Give Policies To)โ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ PCI DSS v4.0 โ†’ ๐Ÿ’ผ 11.4.1 A penetration testing methodology is defined, documented, and implemented by the entity.

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 11.3.1 Perform external penetration testing at least annually and after any significant infrastructure or application upgrade or modification.
๐Ÿ’ผ 11.3.2 Perform internal penetration testing at least annually and after any significant infrastructure or application upgrade or modification.
๐Ÿ’ผ 11.3.3 Exploitable vulnerabilities found during penetration testing are corrected and testing is repeated to verify the corrections.
๐Ÿ’ผ 11.3.4 If segmentation is used to isolate the CDE from other networks, perform penetration tests at least annually and after any changes to segmentation controls/methods to verify that the segmentation methods are operational and effective, and isolate all out-of-scope systems from systems in the CDE.1
ย ย ย ย ๐Ÿ’ผ 11.3.4.1 If segmentation is used, confirm PCI DSS scope by performing penetration testing on segmentation controls at least every six months and after any changes to segmentation controls/methods.