PCI Penetration Testing

Utilise our PCI Penetration testing services that offer great value, technical expertise and remediation plan. No fuss around scheduling, retests, report delays – guaranteed! 

Get In Touch

We will not share your details with third parties.

Shall we keep you informed on the threat reports & useful guidance? No salesy newsletters. View our privacy policy.

PCI DSS Compliance

Wikipedia defines PCI DSS as ‘The Payment Card Industry Data Security Standard ‘ is an information security standard for organizations that handle branded credit cards from the major card schemes.

Regular assessments are required as key controls mandated by PCI DSS to protect CDE systems and data. PCI DSS (Payment Card Industry Data Security Standard) state the penetration testing requirements:

  • PCI Requirement 6.6 states protecting internet-facing applications from new threats and vulnerabilities on an ongoing basis. 
  • PCI Requirement 11 outlines ‘regularly test security systems and processes’.
PCI DSS Penetration Testing

What is PCI penetration testing?

Penetration Testing

PCI penetration testing is performed to identify security vulnerabilities in line with PCI DSS requirements. It is targeted on the internal systems that store, process or transmit cardholder data, public-facing devices and systems and databases. Segmentation controls are verified as part of segmentation pen tests. External penetration testing is performed on the internet facing systems. This is not a vulnerability scan.

This is a controlled form of an ethical hacking exercise with the following objectives:

  • Assess the security controls in line with PCI DSS compliance requirements
  • Determine whether a threat actor could gain unauthorised access to CDE systems that store, process or transmit payment data

No retest and cancellation faff

What are the 12 requirements of PCI DSS Compliance?

1: Install and maintain a firewall configuration to protect cardholder data

2: Do not use vendor-supplied defaults for system passwords and other security parameters

3: Protect stored cardholder data

4: Encrypt transmission of cardholder data across open, public networks

5: Protect all systems against malware and regularly update anti-virus software or programs

6: Develop and maintain secure systems and applications

7: Restrict access to cardholder data by business need to know

8: Identify and authenticate access to system components

9: Restrict physical access to cardholder data

10: Track and monitor all access to network resources and cardholder data

11: Regularly test security systems and processes

12: Maintain a policy that addresses information security for all personnel 

Types of PCI DSS penetration testing services

Based on the scope of assets within CDE, any of the following types of services can be aligned to PCI requirements. This is performed by experienced and qualified penetration testers. 

PCI Internal Penetration Testing

Internal pentesting services cover a broad spectrum of services - from simple one server review to multi-network estate wide active directory reviews.


Web Application Pen Testing

Our team of Cybersecurity experts will test and perform PCI security assessments against apps and web services/APIs in the scope .


Cloud Pen Testing

Most organizations are migrating to cloud due to ease of use and 24 x 7 availability. As an end user of cloud hosted solution, it is your responsibility to ensure that the security of assets in cloud.


Vulnerability Assessments

Vulnerability assessments provide insight into vulnerabilities affecting your internal and external networks.
It helps to identify and quantify the potential risks threatening your environment while minimising internal costs.


Mobile Pen Testing

Ensuring the safety and security of user data is paramount to running any mobile applications.
Our tailored services are designed to identify potential threats and vulnerabilities before it’s too late to limit the damage.


Segmentation Penetration Tests

PCI Network segmentation testing checks whether internal segments have restrictive controls in place. Fundamental concepts behind segmentation penetration test include switch based VLAN security controls or internal firewalling.


Benefits of PCI DSS penetration testing & vulnerability analysis

Your trusted partner in PCI pen testing

Recent Blog Entries

3 Principles of Information Security (Threats & Policies)

Read about 3 principles of information security and difference between information and cyber security. Further details include basics around security policies and their importance.

Top 7 API Security Risks (including prevention tips)

With APIs meteoric rise, most of our important data is consumed by API endpoints. It is important to ensure security is not an after thought. Read about top API security risks, attack examples and prevention measures.

Brexit and Data Protection | UK GDPR Law

Explaining the differences between DPA vs GDPR, for those wondering the differences between DPA and the newest GDPR legislation.

Top 6 Healthcare Cyber Security Threats and Best Practices (2021)

Healthcare troubles have worsened in 2020, facing two-pronged attack – Pandemic and Cyber Threats. Read our article detailing cyber security threats and best practices to follow in the healthcare sector in 2021. Discover more.

Facts About Computer Viruses & Malware (including 6 Virus Myths)

Read about interesting fun facts about computer viruses, their history and types. A fun read to beat your post lunch blues.

eCommerce Security : Cyber Threats & Best Practices (2021)

eCommerce platforms such as BigCommerce, Magento, Shopify are an attractive target for attackers. Learn what are the cyber threats facing eCommerce sector and best security practices to secure these businesses.

OWASP API Security Top 10 (With examples & fixes)

OWASP API Security Top 10 are the go to standard for API security. This article presents attacks, examples and how to prevent API security attacks. Discover more on thecyphere.com.

OWASP Top 10 Application Security Risks (With Examples & Recommendations)

OWASP Top 10 Web Application Security Risks are the go to benchmark against web application attacks. This article presents attacks, examples and how to prevent these web application attacks. Discover more on thecyphere.com.

Top 7 Office 365 Security Best Practices (includes Actionable Tips)

Office 365 security best practices with actionable tips to improve your organisations’ security posture. We highly believe that with products, it’s more important to get the best out of product features first before investing into high end consultancies or shopping new products. We hope this article offers a useful advice for your organisation.

Red Team vs Penetration Testing – Which one is the right choice for your business?

With cyber threats increasing at exponential rate, defensive techniques must evolve at the same rate. Red Team vs Penetration Testing – Which one is the right choice for your business? Both have pros and cons, but what’s best for your environment. Whether you should do it, when not to do it, benefits, costs and vendor selections.