What if the breach already happened?
Effective network segmentation plays a critical role in managing the scope of PCI DSS compliance. For service providers, where multiple environments and interconnected systems may coexist, this isolation requires a clear understanding and is not a one-time task but an ongoing necessity.
Requirement 11.4.6 of PCI DSS v4.0 introduces a specific obligation: service providers using segmentation to isolate their Cardholder Data Environment (CDE) must validate the effectiveness of those controls through penetration testing at least once every six months or immediately following any changes to segmentation controls/methods.
Segmentation (also referred to as “network segmentation” or “isolation”) defines the logical separation between the CDE and non-CDE systems. Its purpose is to reduce risk exposure and narrow the scope of assessment. However, network environments are not static. Updates to firewalls, changes in routes, or newly introduced systems can inadvertently expose sensitive areas if segmentation rules are misconfigured or bypassed.
Periodic testing under Requirement 11.4.6 acts as a verification layer. It assures that segmentation measures remain intact and that the CDE is not accessible from out-of-scope networks or untrusted zones.
Requirement 11.4.6 outlines the minimum expectations for segmentation testing among service providers. It stipulates the following:
Failing to validate segmentation controls can expose service providers to significant compliance gaps. Some of the most frequent issues observed in this area include:
As with all elements of PCI DSS, maintaining verifiable evidence is essential. Service providers are expected to retain detailed records of the test methodologies and tools employed, the specific segmentation controls evaluated, the results obtained, along with any identified findings, and any remediation actions undertaken where applicable. These records not only demonstrate a proactive approach to compliance but also support the overall integrity of the security testing process.
During formal assessments, this documentation must be readily available for review to confirm compliance with Requirement 11.4.6. Establishing a consistent testing schedule, particularly one that is synchronised with infrastructure change management procedures, can greatly assist in meeting this requirement efficiently. This approach not only strengthens accountability but also reinforces the effectiveness and continuity of segmentation testing within the broader PCI DSS framework.
Do you know?
PCI DSS v4.0.1 Vulnerability RulesSegmentation testing is not an isolated activity; it supports other areas of PCI DSS by reinforcing control boundaries. It contributes to maintaining accurate scoping, reduces exposure in the event of compromise, and ensures that protective measures apply only where required, improving efficiency without compromising security.
Service providers handling payment card data within complex or shared environments must give particular attention to segmentation validation. By routinely testing and documenting their segmentation controls, they strengthen their overall compliance posture and uphold trust with their customers and partners.
LAUNCH
Managed Security
Service Provider
What if the breach already happened?