Payment Card Compliance

PCI-DSS
Penetration Testing

PCI-DSS 4.0 doesn't make pentesting optional. If you process credit cards, Requirement 11.3 says you need an annual pentest of your cardholder data environment. We deliver QSA-ready reports in 5 business days, scoped to your specific payment infrastructure.

What PCI-DSS 4.0 Requires

Version 4.0 tightened the testing requirements. Here's what that means for your business and why skipping it isn't an option.

Requirement 11.3

This is the one that matters. It mandates annual pentesting of your Cardholder Data Environment and every system connected to it. External testing, internal testing, and application assessment are all in scope.

  • Annual penetration test required
  • External network: mandatory
  • Internal network: mandatory
  • Application layer testing
  • Wireless assessment

What Non-Compliance Looks Like

Visa and Mastercard don't bluff about PCI enforcement. Failing compliance can mean monthly fines from $5K to $100K+, higher processing fees, or losing your merchant account entirely. That last one shuts down your ability to take cards.

  • Card brand audit penalties
  • Monthly fines ($5K-$100K+)
  • Merchant account suspension
  • Revenue impact if you can't process cards

Breach Prevention

Payment card breaches are brutal. Legal fees, notification costs, forensic investigations, and the reputational hit. A pentest finds the holes before an attacker does. That's always the cheaper path.

  • Find payment system vulnerabilities early
  • Avoid breach notification costs
  • Keep customer trust intact
  • Reduce fraud liability

Keep Your Merchant Account

If you accept credit cards, your merchant account is a lifeline. PCI compliance keeps it in good standing. Losing it means you can't process payments, and getting a new one after non-compliance is hard.

  • Protect your merchant account status
  • Stay in good standing with processors
  • Meet acquiring bank requirements
  • Smooth annual renewals

What We Test

Everything that touches, stores, or transmits cardholder data. Plus the systems around it that could provide a path in.

Cardholder Data Environment

The CDE is ground zero. We test the systems that actually handle card data: POS terminals, payment gateways, databases storing card info, and backup systems. If it touches cardholder data, it's in scope.

  • Payment processing systems
  • POS terminal security
  • Payment gateway integrations
  • Database and backup security
  • Cardholder data storage verification

Network Segmentation

PCI requires your CDE to be segmented from the rest of your network. We test whether that segmentation actually holds up. Can someone on the guest Wi-Fi reach the payment network? We find out.

  • Firewall rule effectiveness
  • Segmentation boundary testing
  • Access control validation
  • Wireless network isolation
  • VPN and remote access paths

Authentication and Access

Who can get into the payment systems, and how? We test for default credentials, weak passwords, MFA bypasses, and privilege escalation. If there's a way to get unauthorized access, we'll find it.

  • Default credential checks
  • Authentication bypass testing
  • Privilege escalation attempts
  • Account lockout testing
  • MFA implementation review

Encryption

Card data needs to be encrypted in transit and at rest. We verify that's actually happening. Weak TLS configs, unencrypted database fields, and poor key management are common findings.

  • TLS/SSL configuration assessment
  • Database encryption verification
  • Detection of unencrypted card data
  • Key management review
  • Transmission security testing

Logging and Monitoring

PCI wants you logging access to cardholder data systems. We check that logs exist, that they're tamper-resistant, and that alerts actually fire when something suspicious happens.

  • Log generation verification
  • Log integrity checks
  • Monitoring system effectiveness
  • Alert configuration review
  • Retention period compliance

Patching and System Security

Are your payment systems patched? Are there known vulnerabilities sitting unpatched on critical systems? We check patch levels, security configs, and whether your defenses would stop exploitation of known CVEs.

  • Vulnerability identification
  • Patch currency check
  • Security configuration review
  • Malware defense testing
  • Antivirus effectiveness

How the Test Works

Five phases. We start by mapping your payment environment and end with a report your QSA can actually use.

01

Map the CDE

We identify all systems in your cardholder data environment and figure out the full scope of what needs testing. This includes systems directly in the CDE and anything connected to it.

02

External Testing

Payment gateways, e-commerce platforms, and anything internet-facing gets tested for vulnerabilities an outside attacker could exploit to reach card data.

03

Internal Testing

We simulate an attacker who's already inside your network. Can they move laterally into the CDE? Are the access controls between network segments actually stopping anything?

04

Wireless Testing

Wi-Fi networks near payment systems are a real risk. We check whether wireless access could give someone a path to your CDE.

05

Reporting

Findings documented with CVSS scores, PCI requirement mapping, and remediation guidance. Formatted for your QSA or acquiring bank.

What You Get

Everything you need for your merchant account file and PCI assessment.

Pentest Report

Professional report addressing Requirement 11.3 specifically. Testing methodology, findings with CVSS scoring, and remediation recommendations. Built for PCI compliance review.

  • PCI-DSS requirement mapping
  • CDE assessment coverage documented
  • CVSS scoring on every finding
  • Specific remediation steps

QSA-Ready Documentation

If you need a full QSA assessment, our documentation supports it. Scope definition, methodology, and findings summary in the format that payment processors and acquiring banks expect to see.

  • QSA-compliant format
  • Methodology documentation
  • Scope definition
  • Findings summary for processors

Debrief and Planning

90-minute consultation after delivery. We go over findings, help prioritize what to fix first, and discuss timelines that'll satisfy your PCI auditor.

  • Findings walkthrough
  • Remediation prioritization
  • Fix categorization by urgency
  • Timeline planning

Retest (Optional)

After remediation, we verify your fixes and document the improvements. Good for your merchant account file and shows your acquiring bank you follow through.

  • Targeted retesting of findings
  • Fix verification
  • Updated compliance status
  • Remediation progress report

PCI-DSS Penetration Testing

Scoped to your payment environment. Annual testing keeps your PCI compliance current.

PCI-DSS Penetration Test

Custom-scoped to your payment environment

  • External payment system testing
  • Web application security assessment
  • Internal network penetration testing
  • Wireless network assessment
  • CDE access control testing
  • Encryption and data protection verification
  • PCI-DSS Requirement 11.3 compliance report
  • QSA-ready documentation
  • 90-minute consultation call
  • 5-day turnaround guarantee
Request a Custom Proposal

Timeline

  • Day 1: Scoping and setup
  • Days 2-3: Active testing
  • Days 4-5: Analysis and report writing
  • Day 5: Delivery + consultation

Annual Testing

  • PCI requires testing every year
  • Schedule early in the calendar year
  • Remediate findings between cycles
  • Retest available after fixes

Annual PCI Compliance Calendar

Test early. Fix what you find. Don't wait until your merchant account renewal is breathing down your neck.

Recommended Schedule

  • Q1: Run the pentest (Jan-Mar)
  • Q2: Remediation (Apr-Jun)
  • Q3: Optional retest to verify fixes (Jul-Sep)
  • Q4: QSA assessment if needed, finalize compliance documentation (Oct-Dec)

Testing early in the year gives you time to fix issues before your merchant account renewal. Your acquiring bank can see that you tested, found problems, fixed them, and verified the fixes. That's the cycle they want to see.

PCI Pentesting FAQ

Answers to the questions we hear from merchants and e-commerce businesses.

Is pentesting required for PCI compliance?

Yes. Requirement 11.3 is explicit: annual penetration testing of your CDE. If you accept credit cards, this isn't optional.

What if we don't do it?

Your merchant account is at risk. Card brands enforce PCI compliance with fines from $5K to $100K+ per month, increased processing fees, or straight-up merchant account suspension. Losing the ability to process cards is a business killer.

Will testing disrupt our payment processing?

We coordinate with your team to avoid disruption. Most testing is non-destructive. We can schedule active testing during off-peak hours, and you'll see the full scope before we start. If something needs to be done during business hours, we'll discuss it ahead of time.

Does this count for our PCI assessment?

It fulfills Requirement 11.3. If you need a full QSA assessment, our documentation feeds directly into that process. Smaller merchants who self-assess with an SAQ typically just need the annual pentest.

What happens if you find critical issues?

We document them clearly and give you specific fix guidance. Critical findings in payment systems need fast attention. We can retest after you've remediated to verify the fixes are solid and update the documentation.

Who's qualified to do PCI testing?

PCI-DSS requires a qualified external tester. All testing is performed by Miguel Velazco, who holds OSCP and CRTO certifications. That meets the industry standard for qualified penetration testers.

Can we reuse last year's pentest?

No. PCI requires a current annual test. Using an old report is a compliance violation. Your environment changes throughout the year, so last year's results don't reflect your current risk anyway.

Do we need a BAA?

Pentesting typically doesn't require one since we don't maintain ongoing access to your payment systems. If you need a confidentiality or security agreement, we can work that out.

Get Your PCI Pentest Done

Satisfy Requirement 11.3. QSA-ready documentation. Scoped to your payment systems. 5-day turnaround.

Qualified Tester

OSCP-certified, meets PCI tester requirements

Payment-Focused

CDE testing for e-commerce and retail

QSA-Ready Reports

Documentation your acquiring bank expects

Contact Us for a Quote