Key takeaways:
- PCI DSS Requirement 11.4 mandates both internal and external penetration testing annually, and after any significant system changes.
- For most SaaS fintech startups, a PCI DSS pentest runs $12,000-$25,000, while basic external-only tests start around $5,000-$8,000. Complex multi-environment testing with segmentation validation runs $20,000-$40,000+.
- Scope definition is where most startups lose money. Every system that stores, processes, or transmits cardholder data is in scope, including backup server, jump box, and identity provider.
- PCI DSS 4.0 is now the only active standard, which means QSAs will not accept reports that follow the 3.2.1 format or methodology.
Many fintech founders first encounter PCI penetration testing requirements reactively, with a deadline.
However, the companies that handle it well aren’t necessarily the ones with the best security programs.
They’re the ones who understand what Requirement 11.4 demands and deal with it in an active and continuous way.
What PCI DSS Requirement 11.4 Says
PCI DSS v4.0.1, now the only active standard since March 2025, states in Requirement 11.4 that “external and internal penetration testing is regularly performed, and exploitable vulnerabilities and security weaknesses are corrected.” Here’s how to break that down:
Requirement 11.4.2: Internal Penetration Testing
Internal penetration testing must be performed at least once every 12 months and after any significant infrastructure or application upgrade or modification.
If you deploy a major code change to your payment processing system, migrate databases, or restructure your network, you test again, you can’t wait for the next annual cycle.
The tester must be “a qualified internal resource or qualified external third-party.” Requirement 11.4.2 requires organisational independence, which means the tester cannot test their own work, but it does not require any specific certification body.
Requirement 11.4.3: External Penetration Testing
External testing follows the same frequency: at least annually and after significant changes.
The tester simulates an attacker on the public internet trying to breach your payment systems, with the same qualification and independence requirements as internal testing.
Requirement 11.4.5: Segmentation Testing
If you’re using network segmentation to reduce your PCI scope, Requirement 11.4.5 requires dedicated testing to validate that the segmentation actually works.
Service providers must test segmentation every six months, while other entities must test annually.
If segmentation fails during testing, everything that can reach the Cardholder Data Environment is now in scope, which typically doubles or triples the testing bill overnight.
What Gets Tested: Your Cardholder Data Environment
Your CDE includes all systems that store, process, or transmit cardholder data or sensitive authentication data, and systems that could provide an attacker a path to those systems.
That second category is where startups often under-scope, and under-scoping costs more in the long run than over-scoping.
Systems that are definitely in scope
- Databases containing the Primary Account Number (PAN), cardholder name, expiration date, or service code
- Application servers processing payment flows, APIs handling card data, and tokenisation services
- Network infrastructure in the path between web servers and payment systems: routers, switches, firewalls, and load balancers
- VPN endpoints used by admins to access CDE systems
- Cloud resources you control in AWS, GCP, or Azure that handle cardholder data
Connected Systems: The Scope That Trips Startups
Connected systems don’t touch card data directly but provide an attack path to systems that do. If compromising System A gives an attacker access to System B, which handles card data, then System A is in scope.
A few examples from real engagements:
- The jump box admins use to SSH into payment database servers
- Your identity provider (such as Okta and Active Directory), because it controls authentication to CDE systems
- Log aggregation systems collecting CDE logs
- Backup servers with access to payment database backups
Common scoping mistakes
- ‘We use Stripe, so we’re out of scope.’ If your code touches card numbers even briefly before tokenisation, those systems are in scope. Stripe handles storage, but if your application server processes the data for any duration, it’s in your CDE.
- ‘That’s just dev/test.’ If your dev environment connects to production systems or contains real cardholder data, then it’s in scope.
- That system doesn’t store cards.’ Doesn’t matter if it can access systems that do. Access equals scope.
External vs Internal Testing: What’s the difference?
Both are required. They test fundamentally different attack scenarios and cannot be replaced for each other.
External Testing
Simulates an attacker on the public internet. The tester starts outside your network perimeter and attempts to breach payment systems from the internet.
This covers your public-facing attack surface: checkout pages, payment APIs, webhook endpoints, admin panels on subdomains, SSL/TLS configuration, authentication, and session management.
Some common external findings: forgotten admin panels on subdomains with default credentials, session tokens that don’t expire or are cryptographically weak, API endpoints that accept card data without rate limiting or input validation, and payment forms vulnerable to SQL injection or XSS.
Internal Testing
Simulates an attacker who has already breached your perimeter, a phished employee, a compromised laptop, or a malicious insider.
The tester starts inside your network and attempts to reach cardholder data from that position. The fundamental question internal testing answers: if one endpoint is compromised, does that give an attacker a path to your payment database?
Segmentation validation is the critical element of internal testing. If you’re using network segmentation to reduce PCI scope, the tester will sit on your corporate network and attempt to reach CDE systems. Everything should be blocked.
Most data breaches in payment environments start externally but succeed internally. An attacker phishes an employee, compromises their laptop, then pivots from that foothold to payment systems. Your external defenses can be excellent, but if internal controls are weak, one compromised endpoint can reach your entire CDE. Internal testing proves whether your containment holds.
How Much Does PCI DSS Penetration Testing Cost?
The range is around $12,000-$25,000 for most startup PCI DSS engagements covering both external and internal testing. Here’s how that breaks down by scope:
- External-only (very limited scope): $5,000-$8,000. Single web payment application, basic API endpoints. Appropriate only for the simplest Stripe or PayPal integration, where your server-side involvement is minimal.
- External + internal (typical startup): $12,000-$20,000. Custom payment flows, internal network testing, and segmentation validation. This is where most Series A and B fintech startups land.
- Comprehensive (complex environment): $20,000-$40,000+. Multiple applications, mobile apps, multi-cloud infrastructure, extensive segmentation validation, third-party integration testing.
PCI DSS tests cost 15-30% more than equivalent non-compliance tests because they require specific methodology, detailed evidence collection, and reporting formats that satisfy QSA review.
Additional Costs to Budget
- Retesting after remediation: $2,000-$5,000. PCI DSS requires that the tester verify that the fixes work. Some vendors include one retest in the initial quote, but not all of them.
- Quarterly ASV vulnerability scanning (Requirement 11.3): $1,000-$3,000 per year. A separate requirement from penetration testing. Automated scans are not manual testing, but are required in addition to the annual pentest.
- Internal remediation: 40-120 engineering hours, depending on findings. At a loaded rate of $150-$200/hour, budget $6,000-$24,000 in internal time.
The cheapest PCI DSS pentest on the market is usually the most expensive in the end. A $4,000 automated scan formatted to look like a manual test gives you a report that satisfies no QSA and catches none of the business logic flaws that represent real cardholder data risk.
One missed vulnerability becomes a breach. The average US data breach costs $4.88 million. A $15,000 pentest that prevents one incident delivers 300x ROI.
How to Prepare for PCI DSS Penetration Testing
Preparation mistakes usually fall into two categories: doing nothing until the vendor arrives, or spending weeks on work that doesn’t move the needle.
Before You Engage a Vendor
Map your CDE first. Trace every path cardholder data takes through your systems, where it enters, which servers it passes through, which databases store it, and where it exits to your payment processor.
Create a network diagram showing CDE boundaries. This becomes your scoping document and prevents scope creep during testing (which costs more than scoping correctly upfront).
Patch everything in scope. Unpatched systems are the one of the most common internal finding. Update operating systems, application frameworks, databases, and network device firmware before the tester arrives. Don’t forget to document what you patched and when.
Fix default credentials. Change every default password on database admin accounts, network device panels, and application admin consoles. Use unique passwords, minimum 16 characters, stored in a password manager.
Remove unnecessary services. Scan every CDE server to see what’s listening on network ports and close anything you don’t need.
During the Test
Give your team advance notice. Notify IT, engineering, and security operations of the testing dates. They should expect unusual traffic, failed authentication attempts, and vulnerability scans in the logs. This is the pentest working as intended, so don’t block the tester’s IP when you see it.
Also, have someone available, because the tester will have questions. If they discover a critical vulnerability, you want to know about it immediately, not only in the report. Designate a technical contact who can respond during testing hours.
Finally, it’s important you never give testers production access to real customer card data. Create test accounts, use test credit cards, and test in a staging environment that mirrors production. A responsible tester won’t want production access to live cardholder data anyway.
Choosing the Right PCI Pentest Provider
These are the three things that matter more than price:
- Methodology alignment: The tester should use and reference OWASP, PTES (Penetration Testing Execution Standard), or NIST SP 800-115. Also look for certifications that demonstrate competence, such as OSCP, GPEN, GWAPT. PCI DSS doesn’t mandate these, but they demonstrate the tester knows what they’re doing.
- PCI 4.0 reporting format: Ask explicitly whether their report format satisfies PCI DSS v4.0.1 QSA requirements. The most current the version, the greater are the chances of being approved.
- Retest policy: At least one free retest should be included. You will have finding and you’ll need to verify fixes. Vendors who charge separately for retesting, or skip it entirely, are going to cost you even more.
SecureLeap conducts PCI DSS penetration testing focused on Requirement 11.4, and offers you remediation guidance in the same program.
For fintech startups managing multiple compliance, we structure a single test that satisfies the frameworks simultaneously, reducing total engagement cost and eliminating the overhead of coordinating separate vendors.
If you want to know how SecureLeap can get you PCI DSS compliant penetration testing, click here to book a free consultation call.
Frequently Asked Questions on PCI DSS Penetration Testing
What’s the difference between PCI DSS penetration testing and vulnerability scanning?
Quarterly vulnerability scanning (Requirement 11.3) is an automated process performed by an Approved Scanning Vendor that checks for known CVEs and misconfigurations against a database of documented vulnerabilities. It’s fast, relatively low cost ($1,000-$3,000 per year for four scans), and catches known issues.
Annual penetration testing (Requirement 11.4) is a manual engagement where a qualified tester attempts to exploit vulnerabilities, chain findings together, and demonstrate real attack paths, including business logic flaws, authentication bypasses, and complex chained vulnerabilities that automated scanners miss. Both are required and neither substitutes for the other.
How much does a PCI DSS penetration test cost?
For a typical SaaS fintech startup, expect $12,000-$25,000 for a compliant engagement covering both external and internal testing. Basic external-only tests (appropriate only for very limited Stripe integrations with minimal server-side involvement) start around $5,000-$8,000. Complex environments with multiple applications, mobile apps, or multi-cloud infrastructure run $20,000-$40,000+.
Can we use our ISO 27001 or SOC 2 pentest to satisfy PCI DSS requirements?
Only if the scope covers your Cardholder Data Environment, the methodology and reporting satisfy PCI DSS 4.0 requirements, and the tester documented findings in a format your QSA will accept.
The controls overlap significantly between SOC 2, ISO 27001, and PCI DSS. However, they are not exactly the same, so the best plan would be to have a custom framework for all of them.
At SecureLeap, we structure combined test programs for clients managing multiple frameworks, which reduces total cost by eliminating duplicate vendor engagements and separate reporting.
How often does PCI DSS require penetration testing?
Annually at minimum for both internal and external testing, plus after any significant system change (major application upgrades, infrastructure migrations, network restructuring, and installation of new system components in or connected to the CDE).
What happens if we fail our PCI DSS penetration test?
What constitutes failure is submitting a report to a QSA that doesn’t cover the required scope, uses 3.2.1 methodology instead of 4.0, or documents unresolved critical findings with no remediation evidence.
Remember: a penetration test that finds vulnerabilities hasn’t failed, because that’s the point of the test. The process is: test, find vulnerabilities, remediate, and retest to verify fixes. PCI DSS requires that “exploitable vulnerabilities and security weaknesses are corrected”, meaning findings must be addressed, not that the first test must be clean.
Does PCI DSS penetration testing scope include our cloud infrastructure?
Yes, the cloud resources you control. If your CDE runs in AWS, GCP, or Azure, your VPCs, security groups, IAM roles, EC2 instances, RDS databases, and S3 buckets storing transaction data are all in scope if they touch cardholder data or could provide a path to systems that do.
What’s not in scope: the underlying cloud infrastructure managed by the provider. AWS is responsible for physical data center security and hypervisor integrity. You’re responsible for everything you configure on top: your security groups, IAM policies, application code, and database configurations.


