Network Penetration Testing for PCI DSS and CMMC Compliance: Scope, Requirements, and Best Practices
Pentestas Team
Security Analyst

💫 Key Takeaways
- PCI DSS 4.0 Requirement 11.4 mandates both external and internal network penetration testing at least annually and after significant changes
- PCI DSS 4.0 introduced a new requirement: penetration testing must validate segmentation controls every 6 months for service providers
- CMMC Level 2 requires penetration testing per NIST SP 800-171 CA.L2-3.12.1; Level 3 adds red team exercises
- The #1 reason organizations fail PCI pentest requirements is scope gaps — missing systems in the CDE or failing to test segmentation
- Your pentest provider does not need to be a QSA, but the report must meet specific criteria that generic pentest reports often lack
- Planning your compliance pentest timeline requires 4–8 weeks lead time — last-minute engagements frequently result in scope or quality compromises
If your organization processes credit card data or handles Controlled Unclassified Information (CUI) for the Department of Defense, you are required to conduct network penetration testing as part of your compliance obligations. But compliance-driven penetration testing is not the same as a general security assessment. The scope must align precisely with the compliance framework's requirements, the methodology must meet specific criteria, the reporting must provide the evidence your assessor needs, and the timing must fit your certification timeline.
We have worked with hundreds of organizations preparing for PCI DSS assessments and dozens preparing for CMMC certification. The most common problem we see is not a lack of testing — it is testing that does not satisfy the compliance requirement because the scope was wrong, the methodology was incomplete, or the report did not include the documentation the assessor needs to validate the control.
This guide breaks down the specific penetration testing requirements for PCI DSS 4.0 and CMMC, explains how to define scope correctly, describes what your assessor will look for in the report, and provides a timeline for planning your engagement. If you have ever had a QSA or C3PAO question the adequacy of your penetration test, this guide addresses the gaps that caused that conversation.
We will be specific about requirement numbers, control IDs, and assessment criteria. This is not a general overview — it is a practical reference for compliance and security teams planning penetration testing engagements.
PCI DSS 4.0
PCI DSS 4.0 Network Penetration Testing Requirements
PCI DSS 4.0, which became mandatory on March 31, 2025 (with some requirements having an extended deadline of March 31, 2025 for "best practice" items that are now enforced), significantly updated the penetration testing requirements from version 3.2.1. Here is what changed and what your assessor will verify:
Requirement 11.4.1 — Penetration testing methodology. You must define, document, and implement a penetration testing methodology that includes industry-accepted approaches (such as NIST SP 800-115, OWASP, or PTES), covers the entire CDE perimeter and critical systems, includes testing from both inside and outside the network, validates segmentation and scope-reduction controls, defines application-layer testing (including the OWASP Top 10 at minimum), and covers network-layer testing including all in-scope network components.
Requirement 11.4.2 — Internal penetration testing. Internal network penetration testing must be performed at least annually and after any significant infrastructure or application changes. The test must be performed by a qualified internal resource or qualified external third party. "Significant changes" includes new system components, network topology changes, firewall rule modifications, and product upgrades that affect the CDE.
Requirement 11.4.3 — External penetration testing. External penetration testing must be performed at least annually and after any significant infrastructure or application changes. The scope must include all externally accessible IP addresses and domains associated with the CDE.
Requirement 11.4.4 — Remediation and retesting. Exploitable vulnerabilities identified during penetration testing must be corrected, and the test must be repeated to verify the corrections. This is not optional — your assessor will look for evidence that findings were remediated and retested.
Requirement 11.4.5 — Segmentation testing (service providers). Service providers must validate segmentation controls through penetration testing at least every six months and after any changes to segmentation controls or methods. This is one of the most frequently missed requirements. If you are a service provider and your segmentation test is only annual, you will fail this control.
What changed from PCI DSS 3.2.1: Version 4.0 added explicit requirements for documented methodology, increased specificity around what "significant changes" trigger re-testing, added the semi-annual segmentation testing requirement for service providers, and strengthened the language around remediation and retesting. Organizations that were compliant under 3.2.1 may not automatically meet 4.0 requirements without adjusting their penetration testing scope and frequency.
CMMC Framework
CMMC Penetration Testing Requirements by Level
The Cybersecurity Maturity Model Certification (CMMC) 2.0 framework aligns with NIST SP 800-171 for Level 2 and adds NIST SP 800-172 enhanced requirements for Level 3. Penetration testing requirements differ by level:
| Requirement | CMMC Level 1 | CMMC Level 2 | CMMC Level 3 |
|---|---|---|---|
| Penetration Testing | Not required | Not explicitly required, but recommended for CA.L2-3.12.1 | Required (red team exercises per 800-172) |
| Scope | N/A | Systems processing, storing, or transmitting CUI | All systems in CUI boundary + adversary simulation |
| Frequency | N/A | As part of security assessment (at least annually recommended) | Periodically (per NIST SP 800-172 3.12.1e) |
| Assessor Type | Self-assessment | C3PAO (third-party assessment organization) | Government-led assessment (DIBCAC) |
| Testing Standard | N/A | NIST SP 800-171 Security Assessment (CA family) | NIST SP 800-172 enhanced security requirements |
CMMC Level 2 and penetration testing. While CMMC Level 2 (aligned with NIST SP 800-171) does not use the words "penetration testing" explicitly in every control, the Security Assessment (CA) family requires organizations to "develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems" and to conduct security assessments that include testing of security controls. In practice, C3PAOs expect to see penetration testing as evidence for CA.L2-3.12.1 (Security Assessment) and several other controls. Organizations preparing for Level 2 certification should include penetration testing in their assessment preparation.
CMMC Level 3 requirements. Level 3 explicitly requires adversary simulation and red team exercises derived from NIST SP 800-172. These are more extensive than standard penetration testing and include testing the organization's ability to detect and respond to advanced persistent threats (APTs). The testing must simulate threat actors relevant to the defense industrial base, which means understanding nation-state TTPs (tactics, techniques, and procedures) as documented in threat intelligence reports.
Scoping
Defining the Correct Penetration Testing Scope
Scope is the number-one reason compliance-driven penetration tests fail to satisfy assessors. If your scope is too narrow, the assessor will find gaps. If it is too broad, you waste budget on systems that are not in scope for the compliance framework. Getting scope right requires understanding what each framework considers in-scope.
PCI DSS scope definition. For PCI DSS, the penetration test scope must include: the cardholder data environment (CDE) — all systems that process, store, or transmit cardholder data; all systems connected to the CDE (even if they do not directly handle card data); all systems that could affect the security of the CDE; all segmentation controls that reduce PCI scope; and all externally facing IP addresses and domains associated with the above. A common mistake is testing the payment application but not the network infrastructure it sits on, the databases it connects to, or the management networks that administrators use to access it.
CMMC scope definition. For CMMC, the scope includes all systems that process, store, or transmit CUI, plus any systems that provide security protection for CUI systems. This includes the network infrastructure, authentication systems (Active Directory), monitoring infrastructure (SIEM), and any cloud services used for CUI processing. The CUI boundary must be documented in your System Security Plan (SSP), and the penetration test scope should align with the SSP's defined boundary.
Segmentation scope. Both frameworks require that segmentation controls be validated. For PCI DSS, this means testing that the CDE is properly isolated from out-of-scope networks. If the segmentation fails, the out-of-scope networks become in-scope, potentially expanding your compliance boundary significantly. Segmentation testing involves attempting to cross network boundaries from out-of-scope networks into the CDE, and from the CDE into out-of-scope networks. The test must verify that controls work in both directions.
Case Study
The Retailer That Failed PCI Due to Scope Gaps
A national retail chain with 150 locations — we will call them RetailMax — had been PCI DSS compliant for three years. Their penetration testing provider conducted annual external and internal tests of the payment processing servers and the e-commerce web application. The reports were clean, and their QSA signed off each year.
When PCI DSS 4.0 took effect, RetailMax's QSA raised concerns during the assessment. The new requirements demanded more rigorous validation of scope and segmentation. The QSA asked for evidence that the penetration test included the in-store point-of-sale (POS) network, the store management network that connected to the POS system, the VPN connections between stores and the central data center, and the segmentation between the POS VLAN and the guest Wi-Fi VLAN in each store.
RetailMax's previous penetration tests had only covered the central data center and the e-commerce application. None of the 150 store networks had ever been tested. The POS network segmentation from the guest Wi-Fi had never been validated. When we were brought in to conduct a properly scoped test, we discovered that 23 of the 150 stores had firewall rules that allowed traffic from the guest Wi-Fi VLAN to the POS VLAN on port 443 — a legacy rule from an initial deployment that was never cleaned up. An attacker on the guest Wi-Fi could have potentially accessed the POS management interface.
RetailMax failed their PCI assessment that year. They had to remediate the segmentation issues across 23 stores, conduct a full retest, and push their compliance certification back by four months. The cost of the emergency remediation, retesting, and delayed certification exceeded $180,000 — not counting the internal engineering time diverted from other projects.
The lesson: RetailMax's previous penetration testing provider was not conducting bad tests — they were conducting good tests on the wrong scope. The central data center was well-protected. But PCI DSS compliance requires testing the entire CDE, including distributed environments. If your organization has multiple locations, remote workers accessing the CDE via VPN, or cloud infrastructure connected to the CDE, your penetration test scope must include all of these elements.
Documentation
Report Requirements That Satisfy Assessors
Your penetration test report is the primary evidence your QSA (for PCI) or C3PAO (for CMMC) will review. A technically excellent report that lacks the documentation your assessor needs will still result in a finding. Here is what compliance assessors look for that generic pentest reports often omit:
Scope statement. The report must clearly document what was tested, including IP ranges, network segments, applications, and which compliance requirement the test addresses. The QSA needs to map the pentest scope to the documented CDE and confirm there are no gaps.
Methodology documentation. PCI DSS 4.0 explicitly requires a documented penetration testing methodology. The report should state which methodology was followed (e.g., PTES, NIST SP 800-115) and describe the testing phases: reconnaissance, enumeration, exploitation, post-exploitation, and reporting.
Segmentation validation results. If segmentation is used to reduce PCI scope, the report must include specific tests performed to validate segmentation and their results. This means documenting the source and destination of each segmentation test, the protocols tested, and the pass/fail result for each. A single sentence saying "segmentation was validated" is insufficient.
Remediation evidence. PCI DSS 11.4.4 requires that exploitable vulnerabilities be corrected and retested. The report (or an addendum) must document the original finding, the remediation performed, and the retest result confirming the fix. Your assessor will look for a closed loop on every exploitable finding.
Tester qualifications. Both frameworks expect the penetration test to be conducted by qualified individuals. The report should identify the testing organization and the qualifications of the testers (certifications, experience). PCI DSS requires the tester to be "organizationally independent" — meaning they cannot test systems they built or maintain.
Planning
Timeline Planning for Compliance Penetration Testing
Planning your compliance penetration test timeline requires working backward from your assessment date. Here is the typical timeline for a properly executed engagement:
| Phase | Duration | Activities |
|---|---|---|
| Scoping & Planning | 1–2 weeks | Define scope aligned with CDE/CUI boundary, agree on methodology, schedule testing windows |
| Active Testing | 2–3 weeks | External testing, internal testing, segmentation validation, AD testing if applicable |
| Reporting | 1–2 weeks | Draft report, quality review, compliance-specific documentation, delivery and debrief |
| Remediation | 2–6 weeks | Engineering team addresses findings, prioritized by severity and compliance impact |
| Retesting | 1 week | Verify remediations, update report with retest results, deliver final report |
| Assessment Ready | — | Final report with remediation evidence ready for QSA/C3PAO review |
Total timeline: 8–14 weeks from scoping to assessment-ready report. This means if your PCI assessment is scheduled for September, you should begin the penetration testing engagement no later than June. We regularly see organizations contact us 3–4 weeks before their assessment date expecting a complete penetration test with remediation and retesting. This is not achievable without compromising quality or scope, which defeats the purpose of the engagement.
For organizations with semi-annual segmentation testing requirements (PCI DSS service providers), you need to plan two testing cycles per year. We recommend aligning one cycle with your annual PCI assessment and scheduling the second cycle six months before or after. This ensures continuous coverage and prevents the common mistake of running both tests in the same quarter and leaving a gap for the rest of the year.
Need a Compliance-Aligned Network Penetration Test?
We deliver network penetration testing reports specifically designed to satisfy PCI DSS 4.0 and CMMC assessors. Our reports include scope validation, segmentation testing, methodology documentation, and remediation evidence — everything your QSA or C3PAO needs to close the control.
Plan Your Compliance Pentest
Alexander Sverdlov
Founder of Pentestas. Author of 2 information security books, cybersecurity speaker at the largest cybersecurity conferences in Asia and a United Nations conference panelist. Former Microsoft security consulting team member, external cybersecurity consultant at the Emirates Nuclear Energy Corporation.