Precursor Security
CREST Accredited | PCI DSS Req. 11.4.5

Network Segmentation Testing

Don't trust. Verify. Your network diagrams say the segments are isolated. Our adversarial probing, zone by zone, packet by packet, proves whether they actually are. We connect to each network segment and attempt to reach restricted systems using techniques your attackers would use: VLAN hopping, DTP negotiation, ACL bypass, and NAC evasion. If a path exists, we find it. Then we prove it in writing.

CREST-accredited testers
Fixed price from £2,500
PCI DSS Req. 11.4.5 methodology
VLAN hopping and DTP testing
QSA-ready written report
Microsegmentation validation
Scroll
The Scan Fallacy

Why an Nmap scan is not segmentation testing.

Running a port scan between VLANs confirms basic reachability. It does not test DTP negotiation, double-tagging, ACL bypass, protocol traversal, or NAC evasion.

Automated Port Scan
Tests TCP/UDP reachability only
Cannot detect DTP negotiation or VLAN hopping vectors
Misses protocol traversal (mDNS, LLMNR, broadcast)
Does not satisfy PCI DSS v4.0.1 Req. 11.4.5
Adversarial Segmentation Test
VLAN hopping, DTP negotiation, double-tagging, ACL bypass
NAC evasion and protocol traversal testing
Source-to-destination zone matrix with pcap evidence
QSA-ready report satisfying PCI DSS v4.0.1 Req. 11.4.5
Executive Summary

Segmentation Risk Profile

Network segmentation is the primary mechanism for containing breaches and reducing compliance scope. When it fails, everything is in scope.

Mandate
11.4.5

PCI DSS v4.0.1 Requirement

Mandates segmentation penetration testing at least annually (merchants) or every six months (service providers).

High Risk
80%

Lateral Movement Rate

Of breaches involve lateral movement. Segmentation is the primary control that stops an attacker moving from the initial foothold to critical assets.

Avg. Cost
£3.4M

UK Breach Cost

Average cost of a UK data breach. Effective segmentation contains the blast radius and reduces the financial impact.

Mapped
Controls
PCI DSS 4.0.1Req 11.4.5
ISO 27001A.8.22
NIST 800-53SC-7
IEC 62443Zones & Conduits
Common Triggers

When Do Organisations Commission This Test?

Network segmentation testing is typically triggered by one of these six scenarios. If any of these apply, you are in the right place.

PCI DSS Req. 11.4.5 Compliance

Your QSA has cited Requirement 11.4.5 as outstanding. You need segmentation testing before your next Report on Compliance.

Post-Incident Lateral Movement

A recent breach or near-miss exposed lateral movement between segments. The board wants proof that boundaries hold.

Microsegmentation Investment Validation

You have deployed Illumio, NSX, or Guardicore. Your insurer or board wants independent validation, not vendor self-reporting.

IoT or OT Network Expansion

New IoT devices, guest networks, or OT zones have been added. You need to verify isolation before connecting them to production.

Merger, Acquisition, or Network Change

Network infrastructure has been merged, migrated, or restructured. Segmentation assumptions from the original design need independent verification.

Cyber Insurance Renewal

Your cyber insurance renewal requires evidence of network segmentation effectiveness. Our report provides the third-party validation underwriters require.

Methodology

Isolation Methodology:
Beyond the Scan

Whether you need PCI DSS Requirement 11.4.5 compliance, Zero Trust validation, or independent verification that your network segregation controls hold under adversarial pressure, we test every source-to-destination zone boundary.

Reconnaissance

Discovery and Mapping

We scan the network from the perspective of the compromised segment, probing for leaky ACLs, misconfigured routes, and protocols that traverse VLAN boundaries. A single misconfigured ACL between your Developer VLAN and your Domain Controller gives an attacker domain admin without ever leaving the internal network.

VLAN Hopping

VLAN Hopping and DTP Negotiation

We test for VLAN hopping vulnerabilities including DTP negotiation attacks (switch spoofing), double-tagging exploits against 802.1Q native VLANs, and trunk port misconfiguration. A single switch port with DTP enabled can allow an attacker to negotiate a trunk link and traverse every VLAN on the switch.

PCI DSS

CDE Boundary Validation

Satisfies PCI DSS v4.0.1 Requirement 11.4.5 (previously 11.3.4) by confirming the Cardholder Data Environment is unreachable from out-of-scope networks. We test both ingress and egress CDE boundaries. QSA-ready report included. Annual testing for merchants, bi-annual for service providers.

OT/IoT

IoT and OT Isolation

Can a compromised smart TV in the lobby reach your internal file servers? We test IoT VLAN boundaries, guest network isolation, IT/OT boundary integrity, and corporate network separation. For OT/SCADA environments, we coordinate with your operational team to schedule testing during planned maintenance windows.

Zero Trust

Microsegmentation Validation

Vendor dashboards show policy coverage percentage. They cannot prove that policy enforcement prevents real lateral movement. We test Illumio, Guardicore, VMware NSX, and Cisco ACI with east-west lateral movement attempts across microsegmented boundaries.

Deliverable

Segmentation Matrix Report

A detailed source-to-destination zone connectivity matrix documenting every path tested, the expected result, what we found, the technique used, and remediation guidance. Structured for QSA review, board presentation, or cyber insurance validation with clear pass/fail verdicts per zone pair.

Sample Deliverable

Source-to-Destination Zone Matrix

Every engagement delivers a connectivity matrix documenting each path tested, the expected result, and what we found. This is the deliverable your QSA will review.

Source ZoneDestination ZoneExpectedResult
Guest Wi-Fi (VLAN 20)Server VLAN (VLAN 10)BLOCKEDFAIL
IoT VLAN (VLAN 30)Domain ControllerBLOCKEDPASS
POS Terminal VLANInternet (NAT)ALLOWEDPASS
Developer VLANCardholder Data Env.BLOCKEDFAIL
Corporate ITOT/SCADA NetworkBLOCKEDPASS
Anonymised sample from a recent engagement. Actual matrices include technique used, tool reference, and pcap evidence for each zone pair.
Engagement Pipeline

Engagement Workflow

Structured to minimise operational friction. Testing can be coordinated with maintenance windows for sensitive environments.

Step 01

Scope

We review your network architecture, segment inventory, and compliance requirements to define the testing boundary and rules of engagement.

Step 02

Architecture Review

Reviewing network diagrams, firewall ruleset, and VLAN configuration to identify the intended traffic flow and locate legacy rules or misconfigurations that may already violate the segmentation design before active probing begins.

Step 03

Adversarial Probing

We connect to each defined segment and attempt VLAN hopping, ACL bypass, protocol traversal, and NAC evasion to reach restricted segments. Every successful path is documented with evidence.

Step 04

Report

Every confirmed boundary crossing is documented with screenshots and pcap captures. The final report is structured for QSA review, board presentation, or insurance audit with clear pass/fail verdicts per zone pair.

Deliverables

What You Get

Every network segmentation test includes the following deliverables, formatted for QSA review, board presentation, and cyber insurance submission.

Source-to-destination zone connectivity matrix with pass/fail verdicts per zone pair
Full technical report with CVSS v3.1 scored findings and pcap evidence of boundary crossings
Executive summary suitable for board, QSA review, and cyber insurance submission
PCI DSS v4.0.1 Requirement 11.4.5 compliance mapping (where applicable)
Firewall rule remediation guidance for each identified segmentation failure
VLAN and ACL configuration recommendations with specific rule changes
Remediation debrief call with your network and security teams
Free retest of remediated findings within the assessment window to confirm fixes are effective

Reports are delivered via our real-time penetration testing portal with role-based access. Also available in PDF and DOCX formats.

Pricing

Transparent pricing.

Fixed-price quotes after a free scoping call. No day-rate surprises.

Standard Segmentation Test

3-5 network segments, PCI DSS CDE validation

2-3 daysFrom £2,500

Microsegmentation Validation

Illumio, NSX, Guardicore, Cisco ACI east-west testing

3-4 daysFrom £3,750

Enterprise / Multi-Site

Multiple VLANs, data centres, OT/IT boundary, multi-site

3-5 daysFrom £3,750
Zone connectivity matrix QSA-ready report Free retest included CREST-accredited consultants
Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Ready to Secure

The best time to test your defences is now.

Join the high-growth companies relying on Precursor for continuous offensive and defensive security.

CREST Triple Accredited|Fixed Price Quotes|Free Scoping Call|UK Based Team

Frequently Asked Questions

Common questions about this service, methodologies, and deliverables.

Network segmentation testing typically costs between £3,500 and £8,000 depending on network complexity and number of segments to validate. A standard segmentation test for PCI DSS CDE validation (testing isolation between 3-5 network segments) averages £3,500 to £5,000 for 2-3 days of testing. Complex environments with multiple VLANs, data centres, microsegmentation platforms, or multi-site deployments typically cost £6,000 to £8,000. For PCI DSS buyers, £3,500 for segmentation validation is a fraction of the cost of full CDE scope expansion, which can triple compliance costs when segmentation controls fail. We provide fixed-price quotes after reviewing your network architecture and compliance requirements.

We connect a physical device or virtual machine to the specific network segment, for example the Guest VLAN or an IoT zone. We then attempt to identify and connect to assets in restricted segments (such as the Server VLAN or Cardholder Data Environment) using a range of adversarial techniques: VLAN hopping, DTP negotiation, ACL bypass, protocol traversal (mDNS, LLMNR), and NAC evasion. Every test attempt is logged with the tool used, the technique, and the outcome. The result is a source-to-destination zone connectivity matrix with clear pass/fail verdicts.

Yes. PCI DSS v4.0.1 Requirement 11.4.5 (previously Requirement 11.3.4 in v3.2.1) mandates that any organisation using network segmentation to reduce PCI scope must perform penetration testing to verify that segmentation is effective and operational. Merchants must test at least annually. Service providers, including managed service providers, payment processors, and SaaS platforms, must test every six months. Testing must validate both ingress and egress CDE boundaries, confirming no path exists between out-of-scope systems and the Cardholder Data Environment. Our segmentation testing report is structured for QSA review and RoC inclusion.

A network penetration test evaluates the security of systems within a network: vulnerabilities, misconfigurations, exploitable services. Segmentation testing evaluates whether network boundaries work as designed, specifically whether an attacker positioned in one segment can reach assets in another. The tests are complementary. In a typical engagement, an internal penetration test validates what can be compromised; segmentation testing validates whether the firewall rules and VLAN boundaries that are supposed to contain a compromise actually do. Many organisations run segmentation testing as a standalone exercise, particularly for PCI DSS CDE validation, rather than as part of a broader pen test scope.

For standard zone isolation testing, network-level access is sufficient. We connect to the source zone and attempt to reach the destination zone using custom packet crafting, without requiring credentials. For PCI DSS Requirement 11.4.5 compliance testing, this unauthenticated approach satisfies the requirement. Authenticated testing can be added to assess whether a compromised account in one zone could traverse segmentation boundaries using legitimate credentials. This is particularly relevant for Zero Trust and microsegmentation validation, where identity is a key enforcement dimension.

Typically, no. The scanning is targeted and low-bandwidth. We test for connectivity between zones, not load testing. Testing windows can be agreed in advance to avoid peak trading hours. For OT/SCADA environments, we coordinate with your operational team to schedule testing during planned maintenance windows or conduct testing at network level only to avoid any disruption to live processes.

Yes. We test whether your NAC solution, such as Cisco ISE, Forescout, or similar, correctly blocks unauthorised devices or moves them to a quarantine VLAN upon connection. NAC bypass is a common finding in segmentation engagements. We also test whether devices that bypass NAC can then reach restricted segments.

Yes. IT/OT boundary testing is one of the highest-stakes segmentation engagements we conduct. We verify the integrity of the air gap, or the segmentation controls where a true air gap has been replaced by managed connectivity, between the corporate IT network and the operational technology (OT) or SCADA environment. Our testing identifies unauthorised paths that would allow a compromise on the IT side to reach industrial control systems, historian servers, or engineering workstations. We work safely within OT environments, coordinating with your operational team to avoid any disruption to live processes.

Yes. We conduct independent validation of software-defined microsegmentation deployments across all major platforms: Illumio, Guardicore (Akamai), VMware NSX, and Cisco ACI. Vendor dashboards show policy coverage percentage. They cannot prove that policy enforcement prevents real lateral movement. Our testing assumes a foothold in one workload and attempts east-west movement across microsegmented boundaries, verifying that identity-based and application-aware policies are enforced at the workload level under adversarial conditions. The resulting report provides the independent third-party evidence required for board reporting and cyber insurance validation of your microsegmentation investment.

Segmentation testing is an active, adversarial engagement rather than a configuration review. We can combine segmentation testing with a firewall configuration assessment as part of a broader scope. Segmentation testing validates zone isolation at the network level; a firewall configuration assessment audits the underlying ruleset for overly permissive ANY/ANY rules, redundant policies, and legacy exceptions that undermine the design intent.