WithPCI Logo
WithPCI.com

11.4.2 Internal penetration testing is performed:

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

11.4.2 Internal penetration testing is performed:

  • Per the entity's defined methodology.
  • At least once every 12 months.
  • After any significant infrastructure or application upgrade or change.
  • By a qualified internal resource or qualified external third-party.
  • Organizational independence of the tester exists (not required to be a QSA or ASV).

Customized Approach Objective

Internal system defenses are verified by technical testing according to the entity's defined methodology as frequently as needed to address evolving and new attacks and threats and ensure that significant changes do not introduce unknown vulnerabilities.

Defined Approach Testing Procedures

11.4.2.a Examine the scope of work and results from the most recent internal penetration test to verify that penetration testing is performed in accordance with all elements specified in this requirement.

11.4.2.b Interview personnel to verify that the internal penetration test was performed by a qualified internal resource or qualified external third-party and that organizational independence of the tester exists (not required to be a QSA or ASV).

Purpose

Internal penetration testing serves two purposes. Firstly, just like an external penetration test, it discovers vulnerabilities and misconfigurations that could be used by an attacker that had managed to get some degree of access to the internal network, whether that is because the attacker is an authorized user conducting unauthorized activities, or an external attacker that had managed to penetrate the entity's perimeter.

Secondly, internal penetration testing also helps entities to discover where their change control process failed by detecting previously unknown systems. Additionally, it verifies the status of many of the controls operating within the CDE.

A penetration test is not truly a "test" because the outcome of a penetration test is not something that can be classified as a "pass" or a "fail." The best outcome of a test is a catalog of vulnerabilities and misconfigurations that an entity can address.

purpose

Alert personnel to suspected compromises.

compliance strategies

  • Automated alerting
  • Incident response integration

typical policies

  • Incident Response Policy

common pitfalls

  • No alerting configured
  • Alerts ignored

type

Technical/Process Control

difficulty

Moderate

key risks

  • Delayed response to attacks

recommendations

  • Integrate IDS/IPS with SIEM and IR workflows

Eligible SAQ

  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy