PCI DSS Compliance

PCI DSS Penetration Testing

Pentests mapped to PCI DSS 4.0 Requirement 11.4. Internal, external, and segmentation testing of your CDE — annual, post-change, and continuous — with evidence your QSA accepts.

Start a PCI DSS pentestHow AI pentesting works

Why PCI DSS pentesting matters now

PCI DSS 4.0 went into full enforcement on 31 March 2025, with new testing requirements that make annual-only testing risky. Requirement 11.4.1 mandates penetration testing methodology documentation; 11.4.3 requires external pentests at least annually and after significant change; 11.4.6 requires segmentation-control testing for merchants. Acquirers are asking for quarterly evidence during the transition — and card brands are increasing enforcement.

PCI DSS clause-by-clause coverage

Every Matproof finding is mapped to the specific PCI DSS clause it informs. Your auditor sees the control, the evidence, and the remediation in one report.

Requirement 11.4.1

Penetration testing methodology must be defined, documented, and implemented

Requirement: A penetration testing methodology is defined, documented, and implemented by the entity, and includes industry-accepted approaches (e.g., NIST SP 800-115, OSSTMM, OWASP).

How Matproof covers it: Matproof's scan methodology aligns with OWASP Testing Guide v4 and NIST SP 800-115 — exported as a PDF methodology document alongside every report.

Requirement 11.4.2

Internal penetration testing

Requirement: Internal penetration testing is performed at least once every 12 months and after any significant infrastructure or application upgrade or change.

How Matproof covers it: Matproof runs authenticated internal pentests across the CDE and connected systems — continuously, not annually — with a full report available on demand.

Requirement 11.4.3

External penetration testing

Requirement: External penetration testing is performed at least once every 12 months and after any significant infrastructure or application upgrade or change.

How Matproof covers it: Black-box external pentests target internet-facing CDE surfaces at your chosen cadence. Continuous is the default.

Requirement 11.4.4

Exploitable vulnerabilities must be corrected

Requirement: Exploitable vulnerabilities and security weaknesses found during penetration testing are corrected and testing is repeated to verify the corrections.

How Matproof covers it: Matproof re-tests fixed findings automatically, producing the verification artefact Requirement 11.4.4 specifies. No manual retest coordination required.

Requirement 11.4.5

Segmentation controls must be penetration tested

Requirement: If segmentation is used to isolate the CDE from other networks, penetration tests are performed on segmentation controls to verify they are operational and effective.

How Matproof covers it: Segmentation testing verifies network controls actually restrict traffic as designed — authenticated scans attempt lateral movement from non-CDE to CDE.

Requirement 11.4.6 (Service providers)

Service-provider segmentation testing

Requirement: Additional requirement for service providers only: segmentation controls are tested at least every 6 months.

How Matproof covers it: Scheduled semi-annual segmentation tests with signed attestation — specifically formatted for QSA review.

What Matproof tests for PCI DSS

  • Cardholder Data Environment (CDE) — web apps, APIs, databases
  • All systems connected to or that can impact the security of the CDE
  • External attack surface of CDE-adjacent systems
  • Internal network segmentation controls
  • Wireless access points and segmentation to CDE
  • Applications handling card data (PAN, CVV, track data)
  • Service-provider CDE boundaries (for Reqt 11.4.6)

Audit-ready PCI DSS reports

  • Findings mapped to Requirements 11.4.1 through 11.4.6
  • Methodology documentation (NIST SP 800-115 / OWASP alignment)
  • Internal, external, and segmentation test evidence split by report section
  • Retest verification for Requirement 11.4.4
  • CVSS 3.1 scoring with business-impact rationale
  • QSA-ready format with AOC-compatible evidence exhibits

PCI DSS 4.0 Penetration Testing — FAQ

Is penetration testing required for PCI DSS?

Yes. PCI DSS 4.0 Requirement 11.4 explicitly mandates penetration testing for all merchants and service providers. Internal and external tests are required annually; service providers must test segmentation controls semi-annually.

Does PCI DSS 4.0 accept AI-automated pentesting?

PCI DSS 4.0 does not prescribe a specific execution method — it requires industry-accepted methodology (NIST SP 800-115, OSSTMM, OWASP) and qualified personnel reviewing results. Matproof's methodology aligns with those standards, and every report is reviewed by a CREST-certified lead before delivery. QSAs have accepted Matproof reports across all major card brands.

What's changed in PCI DSS 4.0 vs 3.2.1?

4.0 adds explicit methodology documentation requirements (11.4.1), strengthens segmentation testing (11.4.5 and 11.4.6), and introduces a 'customised approach' that allows continuous testing as an alternative to point-in-time. Matproof is ideally suited for the customised approach.

How does continuous PCI DSS testing compare to annual testing?

Annual testing satisfies the minimum. Continuous testing satisfies the intent — Requirement 11.4.4 requires re-testing after fixes, and 12.10.x requires rapid detection of new exposures. Continuous scanning catches drift that annual testing misses. Matproof delivers both the formal annual report and the ongoing evidence stream.

Related articles

Explore Matproof

Ready to make PCI DSS pentesting continuous?

Start a free scan in minutes. Get your first PCI DSS-mapped findings the same day.

Start a PCI DSS pentest