WithPCI Logo
WithPCI.com

A3.2.4 If segmentation is used, PCI DSS scope is confirmed as follows:

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

A3.2.4 If segmentation is used, PCI DSS scope is confirmed as follows:

  • Per the entity's methodology defined at Requirement 11.4.1.
  • Penetration testing is performed on segmentation controls at least once every six months and after any changes to segmentation controls/methods.
  • The penetration testing covers all segmentation controls/methods in use.
  • The penetration testing verifies that segmentation controls/methods are operational and effective, and isolate the CDE from all out-of-scope systems.

PCI DSS Reference: Requirement 11

Customized Approach Objective

This requirement is not eligible for the customized approach.

Defined Approach Testing Procedures

A3.2.4 Examine the results from the most recent penetration test to verify that the test was conducted in accordance with all elements specified in this requirement.

Purpose

PCI DSS normally requires segmentation controls to be verified by penetration testing every twelve months.

Validating segmentation controls more frequently is likely to discover failings in segmentation before they can be exploited by an attacker attempting to pivot laterally from an out-of-scope untrusted network to the CDE.

Good Practice

Although the requirement specifies that this scope validation is carried out at least once every six months and after a significant change, this exercise should be performed as frequently as possible to ensure it remains effective at isolating the CDE from other networks.

Further Information

Refer to Information Supplement: Penetration Testing Guidance for additional guidance.

purpose

Designated Entities must perform penetration testing to verify segmentation controls at least every six months.

compliance strategies

  • Biannual segmentation testing
  • Documented test results

typical policies

  • Segmentation Testing Policy

common pitfalls

  • Missed tests
  • Unverified segmentation

type

Technical/Process Control

difficulty

High

key risks

  • Scope creep due to poor segmentation

recommendations

  • Use qualified penetration testers

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy