1. Schedule a 30-minute Discovery Session
2. We determine IF and HOW we can help
3. We provide a Tailored Proposal
4. Together, we review the Proposal
PCI DSS stands for Payment Card Industry Data Security Standard. It’s the rulebook that governs how customer card data gets managed. Recently, it was adapted to require both a vulnerability scan and a pen test. The vulnerability assessment and penetration test must include the perimeter of the Cardholder Data Environment (CDE) and any systems which, if compromised, could impact the security of the CDE. PCI Penetration tests must be performed at least once annually and every six months for service providers.
Penetration Testing assesses the controls used to protect the CDE for PCI DSS.
Specifically, PCI DSS 3.2 distinguishes between a vulnerability scan (Requirement 11.2) and a penetration test (Requirement 11.3), both of which are required for PCI DSS compliance. PCI DSS Requirement 11.3.4.1 requires an organization to perform penetration testing on CDE segmentation controls every six months. The PCI Security Standard Council’s guidance states organizations should:
Examine the results from the most recent penetration test to verify that:
Although PCI DSS only specifies a penetration test every 180 days, we recommend a quarterly program that includes validation testing.
We follow a seven-phase methodology designed to maximize our efficiency, minimize risk, and provide complete and accurate results. The overarching seven phases of the methodology are:
It is better to have an ethical hacker find the holes in your healthcare environment than an adversary. Our PCI Penetration Testing Services provide details on exploitable vulnerabilities in a prioritized, tangible manner. Our report allows you to understand better what your environment looks like from an attacker’s perspective; what the “attack surface” looks like. This helps you prioritize efforts to mitigate risk to reduce data breach likelihood.
Not only do our PCI Penetration Testing Services show you what your attack surface looks like to an adversary, but they can also be used as a safe way to test your organization’s incident response capabilities. Our Penetration Testing services can also be used to tune and test your security controls, such as your IDS, Firewall, Web Application Firewall (WAF), Router Access Control Lists (ACLs), etc.
The number of cybersecurity incidents continues to climb. The variety of attacks continues to grow. It is no longer a question of if you will have a cyber event.