Meet the PCI-DSS requirements.

PCI-DSS
Compliance
Services

Our services allow you to successfully meet the PCI-DSS requirements efficiently and with little overhead.

Reach out to an Expert

Without commitment. We answer within 24h.

Orange Question Mark

What is PCi-DSS Compliance?

PCI-DSS (Payment Card Industry Data Security Standard) is a set of technical and organizational requirements designed to help businesses protect their customers’ credit card data against fraud through robust payment security measures. PCI-DSS is enforced by the founding members of the PCI Council: American Express, Discover Financial Services, JCB, MasterCard and Visa Inc. To ensure the security of card data, one of PCI’s key security controls requires organizations to perform a yearly security assessment of their card-handling systems to fix any technical vulnerability that could potentially compromise card payments or its processing.

Want to plan an upcoming project or simply learn more?

PCI-DSS REQUIREMENTS

What is the Scope of a PCI-DSS Penetration Test?

The PCI-DSS requirements mandate that organizations test the security of any systems involved with card-processing. This is why the testing scope to achieve PCI compliance may vary from one organization to another, depending on the extent of their cardholder data environment (CDE).

Internal Servers

External Networks

Websites, Applications or APIs

Wireless Networks

Card Payment Machines

Cloud Infrastructure

Reasons to Become PCI Compliant

PCI-DSS compliance can generate value for your business and help demonstrate your commitment to data security.

Prevent costly fines

Protect credit card data

Protect card-processing systems

Establish customer trust

Secure partnerships

Reduce costs to comply with other standards

PCI-DSS Compliance Services Logo

Need to Comply With PCI?

Connect with a real expert. No engagement or commitment. We answer within 24h.
PCI-DSS REQUIREMENTS

PCI-DSS Penetration Testing Requirements

PCI DSS Requirement 6.1

Establish a process to identify security vulnerabilities in your internal and external applications, by using reputable outside sources for security vulnerability information, and assign a risk ranking (for example, as ‘high,’ ‘medium,’ or ‘low’) to newly discovered security vulnerabilities.

PCI DSS Requirement 6.2

Ensure that all software and system components are protected from known vulnerabilities by installing the applicable security patches provided by the supplier. You must install the patches within the first month following their release.

PCI DSS Requirement 11.3.1

Perform external penetration tests at least once a year and after any significant changes or upgrades to the infrastructure / application (for example, upgrading the system, adding a subnet or web server to the environment, etc.).

PCI DSS Requirement 11.3.2

Perform internal penetration tests at least once a year and after any change or upgrade significant infrastructure or the application (for example, upgrade of the operating system or adding a subnet or web server in the environment).

PCI DSS Requirement 11.3.3

Vulnerabilities found during the penetration tests must be fixed and additional testing must be performed until the identified vulnerabilities have been successfully corrected.

PCI DSS Requirement 11.3.4

If segmentation is used to isolate the CDE from other networks, penetration test must be performed at less once a year and following modification of the methods / controls of segmentation to verify that the segmentation methods are operational and effective.

Need to Comply With PCI's Pentest Requirements?

We’ve got you covered! Reach out to an expert to learn more about the process or to plan your upcoming test. No commitment / obligation.
Orange Question Mark

Frequently Asked Questions

There is an overwhelming amount of information to decipher when it comes to PCI compliance. If you couldn’t find the answer to your question below, don’t hesitate to ask an expert.

Our services are specially designed to ensure that you meet the PCI-DSS requirements efficiently, without any guessing games. 

We will provide evidence, through a technical report and an official attestation, that you have identified and successfully fixed any exploitable vulnerabilities within card processing systems and your external infrastructure, allowing your organization to comply with the PCI-DSS 6.x and 11.3.x requirements.

The cost of a PCI penetration test varies significantly according to the scope of your cardholder data environment (CDE). For this reason, there is no established price range for this type of assessment. To find out how much your penetration test would cost, reach out to our specialists to get a free quote.

Learn more about the factors that determine the cost →

Manual penetration tests and fully automated scanners are the most common techniques to identify and fix cybersecurity vulnerabilities within your technologies, allowing you to meet Requirements 6 and 11

While scans can be a great starting point for those who lack the resources for manual testing, they may not be sufficient to comply with PCI due to their automated nature. Only experienced professionals should rely on scans to become PCI compliant, as these tools may fail to identify every vulnerability that could compromise your CDE, leaving your card-processing systems vulnerable.

Learn more about the main differences between vulnerability assessments and pentests →

Various steps are taken by our specialists to prevent the potential impact of our tests on the stability of your technological environment and the continuity of your business operations.

Unless specifically instructed to, our specialists refrain from performing any disruptive types of attacks that can, for example, cause denial of service. Thereby, most of our clients are unable to perceive any impact of our tests due to the rigorous measures we deploy to conduct our projects as seamlessly as possible.

According to the PCI-DSS standards, merchants and providers are permitted to store cardholder data once they become compliant. Some acquirers may permit sensitive authentication data to be stored but only prior to payment authorization.

Certifications

We've Earned Internationally-Recognized Certifications

Contact a Certified Expert

Talk with a real expert. No engagement. We answer within 24h.
penetration testing provider