Strobesstrobes
Platform
Solutions
Resources
Customers
Company
Pricing
Book a Demo
Strobesstrobes

Strobes connects every exposure signal to autonomous action, so security teams fix what matters, prove what works, and stop chasing noise.

Book a DemoTalk to an expert
ISO 27001SOC 2CREST
  • Platform
  • Platform Overview
  • Agentic Exposure Management
  • AI Agents
  • Integrations
  • API & Developers
  • Workflows & Automation
  • Analytics & Reporting
  • Solutions
  • Exposure Assessment (EAP)
  • Attack Surface Management
  • Application Security Posture
  • Risk-Based Vulnerability Management
  • Adversarial Exposure Validation (AEV)
  • AI Pentesting
  • Pentesting as a Service
  • CTEM Framework
  • By Industry
  • Financial Institutions
  • Technology
  • Retail
  • Healthcare
  • Manufacturing
  • By Roles
  • CISOs
  • Security Directors
  • Cloud Security Leaders
  • App Sec Leaders
  • Resources
  • Blog
  • Customer Stories
  • eBooks
  • Datasheets
  • Videos & Demos
  • Exposure Management Academy
  • CTEM Maturity Assessment
  • Pentest Health Check
  • Security Tool ROI Calculator
  • Company
  • About Strobes
  • Meet the Team
  • Trust & Security
  • Contact Us
  • Careers
  • Become a Partner
  • Technology Partner
  • Partner Deal Registration
  • Press Release

Weekly insight for security leaders

CTEM research, agentic AI trends, and what's actually moving the needle.

© 2026 Strobes Security Inc. All rights reserved.

Privacy PolicyTerms of ServiceCookie PolicyAccessibilitySitemap
Back to Blog
PCI DSS v4.0 Changes: Pen Testing & Vulnerability Management Explained
Compliance

PCI DSS v4.0 Changes: Pen Testing & Vulnerability Management Explained

AlibhaJune 26, 20245 min read

Table of Contents

  • Vulnerability Scanning vs. Penetration Testing
  • Clarifications and Evolutions in PCI DSS v4.0 Changes
  • Outsourcing vs. Internal Penetration Testing
  • Meeting Key PCI DSS v4.0 Requirements
    • 1. Annual Penetration Testing of Cardholder Data Environments (CDEs):
    • 2. Quarterly Vulnerability Scanning with an Approved Scanning Vendor (ASV):
    • 3. Verification of Remediation and Risk-Based Approach:
    • 4. Segmentation Controls and Multi-Tenant Service Providers:
  • Embracing Proactive Cybersecurity Measures
  • Strobes Security: Your Partner in PCI DSS v4.0 Compliance

Authors

A
Alibha

Share

Table of Contents

  • Vulnerability Scanning vs. Penetration Testing
  • Clarifications and Evolutions in PCI DSS v4.0 Changes
  • Outsourcing vs. Internal Penetration Testing
  • Meeting Key PCI DSS v4.0 Requirements
    • 1. Annual Penetration Testing of Cardholder Data Environments (CDEs):
    • 2. Quarterly Vulnerability Scanning with an Approved Scanning Vendor (ASV):
    • 3. Verification of Remediation and Risk-Based Approach:
    • 4. Segmentation Controls and Multi-Tenant Service Providers:
  • Embracing Proactive Cybersecurity Measures
  • Strobes Security: Your Partner in PCI DSS v4.0 Compliance

Authors

A
Alibha

Share

The PCI DSS v4.0 Changes usher in a new era of proactive payment security under the Payment Card Industry Data Security Standard (PCI DSS) v4.0. While PCI DSS v3.2.1 is retired on March 31, 2024, specific v4.0 requirements are enacted after a one-year grace period. This article delves into the critical changes impacting vulnerability scanning and penetration testing under Requirement 11 of PCI DSS v4.0.

Vulnerability Scanning vs. Penetration Testing

Often confused, vulnerability scanning and penetration testing serve distinct purposes:

  • Vulnerability Scanning: An automated process that identifies potential weaknesses in systems and applications. It offers a preliminary snapshot of security vulnerabilities within your environment. While a valuable first step, vulnerability scanners require human validation to confirm identified issues.
  • Vulnerability Management Lifecycle: PCI DSS V4 emphasizes the vulnerability management lifecycle, encompassing:
    • Identification: Proactively identifying vulnerabilities through various methods like scanning, penetration testing, and threat intelligence.
    • Investigation: Analyzing identified vulnerabilities to understand their severity and potential impact.
    • Remediation: Prioritizing and taking corrective actions to address vulnerabilities, such as patching, mitigating controls, or security configuration changes.
    • Maintenance: Continuously monitoring and updating the vulnerability management process to adapt to evolving threats and technologies.
  • Penetration Testing: A comprehensive security assessment conducted by experienced professionals. Penetration testers delve deeper than automated scans, actively attempting to exploit vulnerabilities and simulate real-world attack scenarios. This exposes potential entry points attackers could leverage and aids in crafting effective remediation strategies.

Clarifications and Evolutions in PCI DSS v4.0 Changes

Penetration testing, often abbreviated as pen testing, retains its significance in PCI DSS v4.0, akin to its role in previous iterations. However, the latest version elucidates the underlying intent while introducing notable clarifications and refinements. Requirement 11.3 transitions to 11.4 in v4.0, emphasizing the importance of maintaining a robust penetration testing methodology (Req. 11.4.1). Unlike a one-size-fits-all approach, this methodology should be bespoke, tailored to the unique environment and assets of each organization.

Feature PCI DSS v3.2.1 (Compliance) PCI DSS v4.0 (Risk-Based)
Pentesting Frequency Annual for all organizations Risk-based: More frequent for high-risk, less frequent for low-risk
Pentesting Scope May not be tailored to specific threats Focuses on critical assets, CDE, and high-risk areas
Vulnerability Management Focus on PCI DSS-listed vulnerabilities Risk-based prioritization based on exploitability, severity, and impact on cardholder data
Vulnerability Scanning External scanning optional Internal scanning with authenticated methods required (best practice until March 31, 2025)

Outsourcing vs. Internal Penetration Testing

Many enterprises opt to outsource their pen testing endeavors, entrusting another entity to provide the requisite methodology. However, for organizations conducting in-house testing, adherence to the delineated guidelines becomes imperative. Requirement 11.4.1 stipulates specific criteria for the pen testing methodology, emphasizing the manual expertise and creative prowess of proficient pen testers.

Meeting Key PCI DSS v4.0 Requirements

1. Annual Penetration Testing of Cardholder Data Environments (CDEs):

The updated requirements (11.4.2 & 11.4.3) necessitate annual penetration testing on both internal and external CDEs. Similarly, penetration tests are required after substantial infrastructure or application modifications.

2. Quarterly Vulnerability Scanning with an Approved Scanning Vendor (ASV):

Requirement 11.3.2 mandates quarterly vulnerability scans by an ASV. This underscores the significance of not just identifying vulnerabilities, but also resolving them following the ASV Program Guide's standards. While quarterly scans are mandatory, additional scans are recommended upon significant infrastructure or application changes.

3. Verification of Remediation and Risk-Based Approach:

The new standard, as part of the broader PCI DSS v4.0 Changes, emphasizes the importance of verifying the effectiveness of corrective actions through repeat testing (11.4.4). Additionally, PCI DSS v4.0 advocates for a risk-based approach to prioritizing remediation efforts. This means focusing on addressing vulnerabilities that pose the greatest risk to your organization.

4. Segmentation Controls and Multi-Tenant Service Providers:

Pen Testing for Service Providers (Req. 11.4.6 & 11.4.7):

  • Enhanced Scrutiny for Service Providers: Requirement 11.4.5 mandates annual penetration testing of segmentation controls, crucial for isolating the CDE. Service providers face stricter pen testing requirements. Segmentation control testing must be performed every six months, not just annually, and following any modifications to these controls.
  • Supporting Multi-Tenant Customers: For multi-tenant service providers, the new standards (11.4.6) call for biannual validation of logical separation controls through penetration testing. An additional set of biannual penetration tests (A.1.1.4) is required for multi-tenant service providers to ensure adequate customer separation within their environment. Finally, Requirement 11.4.7 emphasizes the responsibility of multi-tenant service providers to assist customers with their external penetration testing needs.

As of March 31, 2025, multi-tenant service providers must either grant their customers direct pen testing access or conduct the testing themselves and provide passing results, with the potential for redacting sensitive details to safeguard their own interests or those of other tenants.

Remember: While social engineering testing isn't currently mandated by the PCI DSS, organizations have the flexibility to incorporate it into their pen testing scope for a more comprehensive security evaluation.

Embracing Proactive Cybersecurity Measures

In conclusion, PCI DSS v4.0 underscores the indomitable significance of penetration testing as a cornerstone of robust cybersecurity frameworks. Beyond mere regulatory compliance, organizations must embrace pen testing as a proactive measure against evolving cyber threats. By fostering a culture of vigilance and continuous improvement, enterprises can fortify their defenses and navigate the ever-changing cybersecurity terrain with confidence.

Strobes Security: Your Partner in PCI DSS v4.0 Compliance

The transition driven by PCI DSS v4.0 Changes demands a strategic approach to vulnerability management and penetration testing. Strobes Security offers comprehensive solutions to empower your organization:

  • Expert Penetration Testing: Our seasoned professionals conduct thorough assessments, aligning with PCI DSS v4.0's risk-based approach.
  • Vulnerability Management Solutions: Leverage our advanced scanning tools and expertise to identify, prioritize, and remediate vulnerabilities effectively.
  • Compliance Guidance & Support: Navigate the complexities of PCI DSS v4.0 with our team of compliance specialists.

Schedule a free consultation today!

Related Reads:

  1. Strobes Penetration Testing Compliance For Audits and Assessments
  2. Integrating PTaaS with CI/CD Pipelines: A Guide to CI/CD Security Testing
  3. Strobes 2023 Pentesting Recap: Trends, Stats, and How PTaaS is Transforming Cybersecurity
  4. How much does a penetration test cost?
  5. Penetration Testing Report: Key Elements You Can’t Miss
  6. Harness the Power of Hybrid Framework in Penetration Testing
  7. Traditional Vs Modern Penetration Testing (PTaaS): Choosing the Right Approach for Your Security Needs
  8. Solution: Pentesting as a Service
Tags
PCI DSS v4.0 Changespenetration testing

Stop chasing vulnerabilities Start reducing exposure

See how Strobes AI agents validate and fix your most critical exposures automatically.

Book a Demo
Continue Reading

Related Posts

NIS2 Cybersecurity Directive: What CISOs Must Do to Stay Compliant and Mitigate Risk
Compliance

NIS2 Cybersecurity Directive: What CISOs Must Do to Stay Compliant and Mitigate Risk

The NIS2 Cybersecurity Directive raises the stakes for compliance, accountability, and enterprise resilience across the EU. For CISOs and security leaders, NIS2 is more than a regulation, it is an opportunity to integrate compliance with risk reduction, strengthen governance, and build long-term bus

Sep 12, 20257 min
Everything You Need to Know About the California Consumer Privacy Act (CCPA) in 2025
Compliance

Everything You Need to Know About the California Consumer Privacy Act (CCPA) in 2025

California Consumer Privacy Act (CCPA): CCPA and CPRA, Simplified On July 1, 2025, the California Attorney General settled with Healthline for $1.55 million, the highest CCPA-related fine to date, citing failure to limit data purpose and lack of sufficient disclosures under the purpose-limitation pr

Aug 7, 202513 min
Understanding FFIEC Compliance: A Complete Guide by Strobes
Compliance

Understanding FFIEC Compliance: A Complete Guide by Strobes

Between rising cyber threats, growing consumer privacy concerns, and increasingly complex regulatory expectations, financial institutions must stay ahead of the curve or risk costly consequences. That’s where FFIEC compliance comes in. Established by a coalition of five federal agencies- including t

Aug 5, 202515 min