Loading

Please wait while we prepare your experience...

Which Regulations Require Penetration Testing? NIS2, PCI DSS, ISO 27001
Pentesting
pentesting
compliance

Which Regulations Require Penetration Testing? NIS2, PCI DSS, ISO 27001

Comprehensive guide to penetration testing compliance requirements across major European and international regulations: NIS2, PCI DSS 4.0, ISO 27001, DORA, GDPR Article 32, and SOC 2. Includes specific requirements, frequency mandates, and testing types required.

10 min read
products.fireline.fwColFrameworkproducts.fireline.fwColControlsproducts.fireline.fwColCoverage%
NIS2 Directive
21
0%
ISO 27001:2022
34
0%
ACN Framework
18
0%
NIST CSF 2.0
28
0%
SOC 2 Type II
22
0%
GDPR Technical
12
0%
CIS Controls v8
8
0%
products.fireline.fwTotal143
87%

Key Takeaways

  • Six major regulatory frameworks either mandate or strongly recommend penetration testing: NIS2, PCI DSS 4.0, ISO 27001, DORA, GDPR, and SOC 2
  • PCI DSS 4.0 is the most prescriptive, requiring annual network pentests and testing after significant changes
  • NIS2 requires "regular testing" for essential and important entities across 18 sectors in the EU
  • DORA mandates advanced threat-led penetration testing (TLPT) at least every 3 years for financial institutions
  • Non-compliance penalties range from EUR 7 million (NIS2 important entities) to EUR 20 million or 4% of global turnover (GDPR)

Penetration testing is no longer just a security best practice — for many European organizations, it is a legal requirement. The regulatory landscape has shifted dramatically since 2024, with NIS2, PCI DSS 4.0, and DORA all strengthening their penetration testing mandates. According to Gartner (2025), 78% of European organizations now cite regulatory compliance as the primary driver for their penetration testing programs, up from 54% in 2022. This guide maps out exactly which regulations require penetration testing, what specific testing they mandate, how often, and the consequences of non-compliance.

Regulatory Requirements at a Glance

RegulationPentesting Required?FrequencyScopePenalty for Non-Compliance
NIS2Strongly implied (Article 21)Regular (at least annual)Essential and important entities in 18 sectorsUp to EUR 10M or 2% of turnover
PCI DSS 4.0Explicitly requiredAnnual + after changesAll entities handling payment card dataFines up to USD 500K/month + loss of processing rights
ISO 27001:2022Expected (A.8.8)Regular (typically annual)Certified organizationsCertification loss
DORAExplicitly requiredAnnual + TLPT every 3 yearsEU financial entitiesUp to EUR 10M or 5% of turnover
GDPRImplied (Article 32)RegularAll EU data controllers/processorsUp to EUR 20M or 4% of global turnover
SOC 2Expected (CC7.1)AnnualService organizationsAudit qualification / report failure

NIS2 Directive (EU 2022/2555)

The NIS2 Directive, effective since October 2024, is the most significant European cybersecurity regulation to date. It expands the scope of the original NIS Directive to cover 18 sectors and introduces stricter security requirements and enforcement.

Pentesting Requirements

Article 21(2) requires essential and important entities to implement "policies on risk analysis and information system security" and "policies and procedures to assess the effectiveness of cybersecurity risk-management measures" — which EU member state transpositions and supervisory authorities consistently interpret as requiring regular penetration testing.

The European Commission's implementation guidance specifically references "vulnerability assessments and penetration testing" as expected security measures. The Dutch, German, and Italian national transpositions all include penetration testing in their recommended security measures.

Who Must Comply

  • Essential entities: Energy, transport, banking, financial market infrastructure, health, drinking water, wastewater, digital infrastructure, ICT service management, public administration, space
  • Important entities: Postal services, waste management, chemicals, food, manufacturing, digital providers, research

Penalties

  • Essential entities: up to EUR 10 million or 2% of worldwide annual turnover, whichever is higher
  • Important entities: up to EUR 7 million or 1.4% of worldwide annual turnover
  • Personal liability for senior management who fail to ensure compliance

For a complete analysis of NIS2 compliance, see our comprehensive NIS2 guide.

PCI DSS 4.0

PCI DSS 4.0, fully effective since March 2025, contains the most explicit and detailed penetration testing requirements of any major regulation.

Specific Requirements

Requirement 11.4: External and internal penetration testing is regularly performed, and exploitable vulnerabilities and security weaknesses are corrected.

  • 11.4.1: A penetration testing methodology is defined, documented, and implemented
  • 11.4.2: Internal penetration testing at least once every 12 months and after any significant change
  • 11.4.3: External penetration testing at least once every 12 months and after any significant change
  • 11.4.4: Exploitable vulnerabilities found during testing are corrected and retesting confirms fixes
  • 11.4.5: Network segmentation controls are tested at least once every 12 months (every 6 months for service providers)
  • 11.4.6: (Service providers only) Testing performed at least every 6 months and after significant changes

Methodology Requirements

PCI DSS 4.0 requires the pentesting methodology to include:

  • Industry-accepted penetration testing approaches (e.g., NIST SP 800-115, OWASP Testing Guide, PTES)
  • Coverage for the entire CDE perimeter and critical systems
  • Testing from both inside and outside the network
  • Testing to validate network segmentation and scope-reduction controls
  • Application-layer testing including the OWASP Top 10 at minimum
  • Network-layer testing including operating systems, firmware, and databases

Qualified Tester Requirements

PCI DSS requires pentesting to be performed by a "qualified internal resource or qualified external third party." The tester must be organizationally independent of the environment being tested. The PCI Council recommends testers hold certifications such as OSCP, GPEN, CREST CRT, or equivalent.

ISO 27001:2022

ISO 27001 does not explicitly mandate penetration testing, but control A.8.8 (Management of technical vulnerabilities) and the broader requirement for risk assessment make it an expected practice for certification.

How Pentesting Supports Certification

  • A.8.8: Requires identification of technical vulnerabilities, evaluation of exposure, and appropriate measures — pentesting is the most effective method for this
  • A.5.36: Compliance with policies, rules, and standards — pentesting verifies that security policies are actually effective
  • A.8.34: Protection of information systems during audit testing — penetration testing falls under this control
  • Clause 9.1: Monitoring, measurement, analysis, and evaluation — pentesting provides measurable security assessment data

Certification Audit Expectations

ISO 27001 certification auditors consistently expect to see evidence of regular penetration testing. While the frequency is not prescribed, annual testing is the widely accepted minimum. Organizations in high-risk environments should test more frequently. Failure to demonstrate regular security testing is a common reason for audit non-conformities.

DORA (Digital Operational Resilience Act)

DORA, applicable to EU financial entities since January 2025, introduces the most rigorous pentesting requirements for the financial sector.

Two Levels of Testing

Basic resilience testing (Article 25): All financial entities must perform ICT resilience testing at least annually, including vulnerability assessments and scans, open-source analyses, network security assessments, gap analyses, physical security reviews, and penetration testing.

Advanced Threat-Led Penetration Testing (TLPT) (Article 26): Financial entities identified by competent authorities as significant must conduct TLPT at least every 3 years. TLPT must:

  • Be based on the TIBER-EU framework or equivalent national frameworks
  • Be performed by qualified external testers (with limited internal team involvement allowed)
  • Cover critical ICT systems that support critical or important functions
  • Include threat intelligence-based attack scenarios
  • Result in a report validated by the relevant competent authority

Who Must Comply

DORA applies to: credit institutions, investment firms, insurance undertakings, payment institutions, electronic money institutions, crypto-asset service providers, central securities depositories, trade repositories, and ICT third-party service providers to financial entities.

GDPR (General Data Protection Regulation)

GDPR does not explicitly mention penetration testing, but Article 32 establishes a clear legal basis for requiring it.

Article 32: Security of Processing

Article 32(1)(d) requires controllers and processors to implement "a process for regularly testing, assessing, and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing." European Data Protection Authorities have consistently interpreted this as including penetration testing, particularly for organizations processing sensitive personal data at scale.

Regulatory Guidance

The European Data Protection Board (EDPB) and national DPAs including the Italian Garante, Spanish AEPD, and French CNIL have all referenced penetration testing in their enforcement decisions and guidance documents as an expected security measure under Article 32. In several breach enforcement actions, the absence of regular penetration testing has been cited as a factor in determining the level of negligence and corresponding fines.

SOC 2 (Service Organization Control 2)

SOC 2, developed by the AICPA, does not explicitly mandate pentesting but includes criteria that effectively require it.

Relevant Trust Service Criteria

  • CC7.1: The entity uses detection and monitoring procedures to identify changes that could significantly affect the system of internal control — pentesting is a primary method for this
  • CC4.1: COSO Principle 16 — The entity selects, develops, and performs ongoing and/or separate evaluations to ascertain whether components of internal control are present and functioning
  • CC7.2: The entity monitors system components and the operation of those components for anomalies that are indicative of malicious acts

SOC 2 auditors routinely expect penetration testing evidence as part of the audit process. Organizations without recent pentest reports face a high risk of qualified audit reports.

Building a Compliance-Aligned Testing Program

For organizations subject to multiple regulations, here is how to build a testing program that satisfies all requirements simultaneously:

RequirementMinimum ActionRecommended Action
Annual network pentestPCI DSS, NIS2, ISO 27001, DORA, SOC 2External + internal, quarterly for high-risk
Web application testingPCI DSS (OWASP Top 10), NIS2Before every major release + annual
After significant changesPCI DSS, NIS2Within 30 days of any major change
Segmentation testingPCI DSS (annual, 6-monthly for SPs)Semi-annual for all
TLPT / Red teamDORA (every 3 years)Annual red team exercises
Social engineeringNIS2 (human factor), DORAQuarterly phishing simulations

Consequences of Non-Compliance

Beyond direct financial penalties, failing to meet pentesting requirements can result in:

  • Loss of certifications: ISO 27001, PCI DSS compliance status
  • Insurance implications: Cyber insurance policies increasingly require evidence of regular pentesting; claims may be denied without it
  • Customer and partner trust: Enterprise customers increasingly require pentest reports as part of vendor due diligence
  • Personal liability: NIS2 and DORA both include provisions for personal liability of senior management
  • Increased breach costs: Organizations without regular testing face higher average breach costs (IBM Security, 2025)

Getting Started

Orizon Fireline provides compliance-aligned penetration testing services designed to meet the requirements of NIS2, PCI DSS 4.0, ISO 27001, DORA, and SOC 2 simultaneously. Our methodology covers all mandated testing types with reports structured to satisfy multiple compliance frameworks, reducing the cost and complexity of your testing program.

For guidance on how often to test based on your industry and regulatory requirements, see our pentesting frequency guide. For a complete overview of the NIS2 directive, read our NIS2 compliance guide.

pentesting
compliance
nis2
pci-dss
iso-27001
regulations