💳PCI DSS 11.3Rule: PCI-11-3high

Internal Penetration Testing

Description

Internal penetration testing must be performed at least annually + after significant changes.

⚠️ Risk Impact

Pen testing surfaces vulnerabilities that automated scanning misses — business-logic flaws, chained vulnerabilities, social engineering paths. Annual cadence is the minimum for sustained security.

🔍 How EchelonGraph Detects This

PCI-11-3Automated scanner rule

EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as high-severity findings with remediation guidance.

🔧 Remediation

Engage qualified internal or external pen testers. Cover web + API + infrastructure + social engineering. Document findings + remediation. Re-test critical findings.

💀 Real-World Attack Scenario

A merchant skipped internal pen testing for 2 years post-COVID. When they finally engaged a tester in 2024, the tester found 23 critical findings — including unauthenticated API endpoints created during the COVID rush. The accumulated vuln backlog represented 2 years of unknown exposure.

💰 Cost of Non-Compliance

PCI 11.3 violations block compliance. Avg vuln-related breach: $4.45M.

📋 Audit Questions

  • 1.When was last internal pen test?
  • 2.Scope covered?
  • 3.Critical findings remediated?
  • 4.Re-test evidence?

🎯 MITRE ATT&CK Mapping

T1190 — Exploit Public-Facing Application

⚡ Common Pitfalls

  • Pen test scope too narrow
  • Findings not remediated before next test
  • Pen tester not properly qualified

📈 Business Value

Regular pen testing catches what automated tools miss.

⏱️ Effort Estimate

Manual

Pen test engagement + remediation

With EchelonGraph

EchelonGraph monitors continuous posture between pen tests

🔗 Cross-Framework References

SOC2-CC4.1NIST-CA-8

Automate PCI DSS 11.3 compliance

EchelonGraph continuously monitors this control across all your cloud accounts.

Start Free →