Now that we have a clear understanding of this standard, let's look at how it affects authenticated scans. One thing to highlight is that this set of guidelines has different versions, which are updated over time to keep pace with evolving security standards.
Earlier versions already included requirement 11.3.1, which mandates performing an internal vulnerability scan at least every three months. This analysis must cover all in-scope systems and requires resolving vulnerabilities classified as critical or high risk, followed by verification scans until these vulnerabilities are confirmed as remediated. The standard also requires that the scan be performed by qualified personnel independent from the systems being evaluated.
The sub‑requirement 11.3.1.2 introduces the authenticated scan modality. Its main requirements include:
▪️Systems that cannot accept credentials for authenticated scanning must be documented.
▪️Sufficient privileges must be used for systems that do accept credentials.
After any significant change, requirement 11.3.1.3 mandates repeating the internal scan to demonstrate that the change did not introduce new risks.
Requirement 11.3.2 maintains the obligation of quarterly external scans performed by an Approved Scanning Vendor (ASV) to monitor the organization’s public-facing surface.
Up to this point, the concept of scanning has been mentioned several times, but what exactly are we referring to?
A vulnerability scan is an automated process in which a specialized tool, such as Nessus or Qualys, analyzes systems, devices, and applications to identify security weaknesses. The tool collects information (open ports, active services, configurations, software versions) and compares it with a database of known vulnerabilities.
This process detects outdated patches, misconfigurations, or obsolete software that could be exploited by an attacker.
With this information, the auditing team will produce a report outlining the vulnerabilities detected, as well as their corresponding solutions.
An unauthenticated scan analyzes the network from the perspective of an external intruder: it enumerates ports, extracts service banners, and detects basic exposure issues. It is faster and requires less preparation but is not exhaustive.
An authenticated scan, however, “opens the hood” of the system: it inspects files, compares versions and patches, analyzes security configurations, verifies encryption algorithms and permissions. It is more thorough and reliable but requires a user account with sufficient privileges on each host.
An authenticated scan is a vulnerability analysis executed from within the corporate network (physically or via VPN) using valid credentials on the systems being analyzed. These credentials allow the scanner to directly query the operating system, registry, running services, and installed libraries.
The PCI DSS standard emphasizes that this approach provides a much deeper and more realistic view of the security posture of the assets, as it reveals vulnerabilities that could be exploited by an attacker with initial access to the network.
Requirements for an authenticated scan:
That said, an authenticated scan has a series of requirements that are not necessary in a ‘normal’ scan. When performing authentication, not only are valid credentials required, but also an account with sufficient privileges and visibility to access everything contained on the system being analyzed.
Authenticated scans can be carried out in two different ways: on‑site or remotely.
If the scan is performed through a VPN or a similar connection to the servers that need to be scanned, this results in a higher load on the VPN network and slower scanning speeds.
On the other hand, if the scan is performed on‑site, auditors must be granted access to the location where the servers are hosted or where they can be directly accessed in order to analyze the environment. This approach provides faster scanning speeds due to the higher bandwidth available when connecting directly to the servers.
Below, we will list a series of steps to prepare an authenticated scan:
As discussed earlier in the article, authenticated scans provide a deeper and more accurate analysis of the environment, but they also introduce technical and operational challenges that must be properly managed. Below are some of the main issues that typically arise and their possible solutions.
▪️Adopting internal authenticated scanning reduces the risk of overlooking deeply rooted vulnerabilities that would otherwise remain undiscovered.
▪️During the first authenticated scan, it is likely that new vulnerabilities will appear. PCI is correct in noting that many components are outdated and contain vulnerabilities that a normal scan would never detect. Fortunately, most of the vulnerabilities found in these cases are related to outdated versions, which means the remediation process is, in most cases, simpler.
▪️A key practice is to keep both software and hardware up to date. Quarterly scans verify that everything is in order and help resolve potential issues, resulting in a more secure infrastructure and, ultimately, achieving PCI DSS certification.
| Authors: | |
| Héctor Berrocal Security Analyst CEH, MCP, CCNA, eJPT, Ewptxv2, ITIL |
Carlos Mayor Security Analyst |