11.4.2 Internal penetration testing is performed:
Defined Approach Requirements
11.4.2 Internal penetration testing is performed:
- Per the entity's defined methodology.
- At least once every 12 months.
- After any significant infrastructure or application upgrade or change.
- By a qualified internal resource or qualified external third-party.
- Organizational independence of the tester exists (not required to be a QSA or ASV).
Customized Approach Objective
Internal system defenses are verified by technical testing according to the entity's defined methodology as frequently as needed to address evolving and new attacks and threats and ensure that significant changes do not introduce unknown vulnerabilities.
Defined Approach Testing Procedures
11.4.2.a Examine the scope of work and results from the most recent internal penetration test to verify that penetration testing is performed in accordance with all elements specified in this requirement.
11.4.2.b Interview personnel to verify that the internal penetration test was performed by a qualified internal resource or qualified external third-party and that organizational independence of the tester exists (not required to be a QSA or ASV).
Purpose
Internal penetration testing serves two purposes. Firstly, just like an external penetration test, it discovers vulnerabilities and misconfigurations that could be used by an attacker that had managed to get some degree of access to the internal network, whether that is because the attacker is an authorized user conducting unauthorized activities, or an external attacker that had managed to penetrate the entity's perimeter.
Secondly, internal penetration testing also helps entities to discover where their change control process failed by detecting previously unknown systems. Additionally, it verifies the status of many of the controls operating within the CDE.
A penetration test is not truly a "test" because the outcome of a penetration test is not something that can be classified as a "pass" or a "fail." The best outcome of a test is a catalog of vulnerabilities and misconfigurations that an entity can address.
purpose
Alert personnel to suspected compromises.
compliance strategies
- Automated alerting
- Incident response integration
typical policies
- Incident Response Policy
common pitfalls
- No alerting configured
- Alerts ignored
type
Technical/Process Control
difficulty
Moderate
key risks
- Delayed response to attacks
recommendations
- Integrate IDS/IPS with SIEM and IR workflows
Eligible SAQ
- SAQ-D MERCHANT
- SAQ-D SERVICE PROVIDER
Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy