WithPCI Logo
WithPCI.com

11.4.5 If segmentation is used to isolate the CDE from other networks, penetration tests are performed on segmentation controls as follows:

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

11.4.5 If segmentation is used to isolate the CDE from other networks, penetration tests are performed on segmentation controls as follows:

  • At least once every 12 months and after any changes to segmentation controls/methods.
  • Covering all segmentation controls/methods in use.
  • According to the entity's defined penetration testing methodology.
  • Confirming that the segmentation controls/methods are operational and effective, and isolate the CDE from all out-of-scope systems.
  • Confirming effectiveness of any use of isolation to separate systems with differing security levels (see Requirement 2.2.3).
  • Performed by a qualified internal resource or qualified external third party.
  • Organizational independence of the tester exists (not required to be a QSA or ASV).

Customized Approach Objective

If segmentation is used, it is verified periodically by technical testing to be continually effective, including after any changes, in isolating the CDE from all out-of-scope systems.

Defined Approach Testing Procedures

11.4.5.a Examine segmentation controls and review penetration-testing methodology to verify that penetration-testing procedures are defined to test all segmentation methods in accordance with all elements specified in this requirement.

11.4.5.b Examine the results from the most recent penetration test to verify the penetration test covers and addresses all elements specified in this requirement.

11.4.5.c Interview personnel to verify that the test was performed by a qualified internal resource or qualified external third party and that organizational independence of the tester exists (not required to be a QSA or ASV).

Purpose

When an entity uses segmentation controls to isolate the CDE from internal untrusted networks, the security of the CDE is dependent on that segmentation functioning. Many attacks have involved the attacker moving laterally from what an entity deemed an isolated network into the CDE. Using penetration testing tools and techniques to validate that an untrusted network is indeed isolated from the CDE can alert the entity to a failure or misconfiguration of the segmentation controls, which can then be rectified.

Good Practice

Techniques such as host discovery and port scanning can be used to verify out-of-scope segments have no access to the CDE.

purpose

Test IDS/IPS detection mechanisms at least annually.

compliance strategies

  • Annual testing exercises
  • Simulated attack scenarios

typical policies

  • IDS/IPS Testing Policy

common pitfalls

  • No testing performed
  • Unverified detection capability

type

Technical/Process Control

difficulty

Moderate

key risks

  • Undetected IDS/IPS failures

recommendations

  • Document and review test results

Eligible SAQ

  • SAQ-A-EP
  • SAQ-B-IP
  • SAQ-C
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy