Your acquirer is asking for ASV scan results. Your QSA just flagged Requirement 11.3.2. Or you've been told you need a "PCI external scan" and nobody has explained what that actually means. This post covers exactly what PCI ASV scanning requires ; who it applies to, what gets scanned, how often, and what passing actually looks like under PCI DSS 4.0.1.

Book your PCI ASV scan with Secusy ASV; from $80/year, no sales call required

What Are the PCI ASV Scan Requirements?

Under PCI DSS 4.0.1, Requirement 11.3.2 mandates that any merchant or service provider in scope must conduct external vulnerability scans at least once every three months using a PCI SSC-listed Approved Scanning Vendor.

The scan must cover all Internet-facing components connected to the cardholder data environment (CDE). A passing certificate is only issued when all high and medium CVSS-scored vulnerabilities are remediated and a clean rescan confirms the result.

Who Needs PCI ASV Scanning?

This is where a lot of businesses get caught out. The requirement isn’t universal; it depends on which Self-Assessment Questionnaire (SAQ) your acquirer or payment brand has assigned to you.

ASV scanning is required under the following SAQ types:

SAQ Type
Who It Applies To
ASV Scan Required?
SAQ A
E-commerce merchants using redirects or iframes to a compliant TPSP
Yes (PCI DSS v4 addition)
SAQ A-EP
E-commerce merchants with partially outsourced payment pages
Yes
SAQ B-IP
Merchants using IP-connected POI devices
Yes
SAQ C
Merchants with payment application systems connected to the internet
Yes
SAQ D (Merchants)
All merchants not covered by A, B, B-IP, or C
Yes
SAQ D (Service Providers)
Service providers storing, processing, or transmitting cardholder data
Yes
SAQ B
Merchants using only imprint machines or standalone dial-out terminals
No

Important nuance on SAQ A: PCI DSS 4.0.1 expanded ASV scan requirements to SAQ A merchants; specifically those whose webpage either redirects to a PCI DSS-compliant third-party service provider (TPSP) or embeds a compliant TPSP payment page via iframe.

This was a deliberate response to the volume of e-commerce breaches targeting these redirect and iframe integrations. If you run a Shopify, WooCommerce, or similar store using a hosted checkout, you likely fall here.
If you’re unsure which SAQ applies to you, your acquiring bank or payment brand defines that; not your ASV.

What Systems Need to Be Included in a PCI ASV Scan?

The scope of an ASV scan covers all Internet-facing components that are part of, or connect to, your cardholder data environment. This includes:

  • Web servers hosting your payment pages or checkout flows
  • DNS servers used to route traffic to your CDE
  • Firewalls and routers with external interfaces
  • Load balancers sitting in front of your payment infrastructure
  • Virtualised components; virtual machines, appliances, and hosts; with external-facing interfaces
  • Any system where a breach could create a pathway to cardholder data

What’s often missed: basic functions like email servers and general internet access can technically create a route into your network. The PCI SSC ASV Program Guide is explicit; even seemingly low-risk paths need to be evaluated against your CDE boundary.

If you’re using network segmentation to reduce scope, your ASV will need confirmation of proper segmentation before excluding systems.

A Note on Hosted Environments

If you host part of your CDE with an ISP or multi-tenant provider, there are two ways this gets handled:

  1. The hosting provider undergoes its own ASV scan and shares the passing evidence with you, OR
  2. The provider’s infrastructure is included within your own ASV scan scope

Either way, the compliance responsibility sits with you as the scan customer. Make sure you know which route your provider takes before your next scan cycle.

What Does a Passing PCI ASV Scan Actually Require?

A passing scan under the ASV Program Guide isn’t just “no critical vulnerabilities found.” The full requirement includes:

Passing criteria checklist:

One thing worth understanding: a passing ASV scan certificate only confirms compliance with Requirement 11.3.2. It does not certify compliance with the rest of PCI DSS.

Your scan report is one piece of evidence your acquirer or QSA reviews; not a full compliance endorsement.

See what a Secusy ASV scan covers — pass certificate delivered within 24 hours

What Happens When a Scan Fails?

Failing scans don’t end your compliance cycle; they start a remediation loop.

The process under the ASV Program Guide:

  1. Your ASV delivers a scan report identifying failing vulnerabilities by CVSS score and CVE reference
  2. You remediate the identified issues on your systems
  3. You request a rescan from your ASV; unlimited rescans are included with Secusy ASV, so there’s no penalty for needing more than one attempt
  4. Once all findings are resolved, your ASV issues the final passing report

A point practitioners often overlook: Denial of Service (DoS) vulnerabilities; where CVSS Confidentiality Impact and Integrity Impact are both “None”; are explicitly excluded from failing a scan under ASV Program Guide rules. ASVs are required not to count DoS-only vulnerabilities as compliance failures. If an ASV is failing your scan for a pure DoS finding with no cardholder data exposure risk, that’s a dispute worth raising.

Similarly, the Triple DEA (3DES/TDES) cipher vulnerability is ranked as Medium by CVSS. Under Requirement 11.2.2, medium and high vulnerabilities must be corrected; but your ASV can re-rank a vulnerability’s severity if your specific environment justifies it, and you can dispute findings where compensating controls reduce the real-world risk.

Common Mistakes That Delay a Passing Scan

Most businesses that struggle to pass their first scan run into the same issues:

  • Scope gaps — Systems are excluded from the scan that should be in scope. Web server IPs are provided but DNS server IPs aren’t. Load balancer addresses are omitted. The scan comes back clean but the QSA flags incomplete coverage.
  • Scan interference — Active protection systems (WAFs, IDS/IPS, Cloudflare) block the ASV’s scan traffic, producing an inconclusive result that can’t be submitted as passing. You must coordinate with your hosting provider and configure systems to allow scan traffic from your ASV’s source IP ranges.
  • Remediation without rescanning – You fix the flagged vulnerability but don’t request a rescan. The official report still shows the unresolved finding. A clean rescan is a mandatory step; not optional documentation.
  • Treating a passing certificate as full PCI compliance – The scan confirms Requirement 11.3.2. It doesn’t confirm Requirement 6 (patch management), Requirement 8 (access control), or any other requirement. QSAs see this confusion frequently.

Summary: What the PCI ASV Scan Requirement Actually Means

PCI ASV scanning under PCI DSS 4.0.1 Requirement 11.3.2 is a quarterly external vulnerability scan of all Internet-facing systems connected to your CDE, performed by a PCI SSC-listed vendor. A passing result requires remediation of all medium-severity and above findings, confirmed by a clean rescan.

The requirement applies to most e-commerce merchants, SaaS companies handling card payments, and service providers; including SAQ A merchants since PCI DSS v4. It does not confirm full PCI compliance, but it is a mandatory component of it.

For the full mechanics of the scanning process; what scopes, what fails, and how to prepare; see our complete guide to PCI ASV scanning services.

Secusy ASV is PCI SSC-listed. From $80/year per IP, with unlimited rescans and analyst support; not a ticket queue. Book your PCI ASV scan and get your pass certificate within 24 hours.

Frequently Asked Questions

Any merchant or service provider whose SAQ type includes ASV scanning under PCI DSS 4.0.1. This covers SAQ A (e-commerce only), SAQ A-EP, SAQ B-IP, SAQ C, SAQ D for merchants, and SAQ D for service providers. Your acquiring bank determines which SAQ applies to you.
No. PCI DSS 4.0.1 Requirement 11.3.2 is explicit — external vulnerability scans must be performed by a PCI SSC-listed ASV. You can initiate a scan through an ASV's portal, but only ASV-employed staff can configure scan parameters, assign severity levels, or modify scan output. Self-scanning does not satisfy the requirement.
At minimum, once every three months. The 90-day window runs from the date of your last passing scan. Additional scans are required under Requirement 11.3.2.1 after significant environment changes — new infrastructure, architecture changes, or major configuration updates.
No. A passing certificate confirms compliance with Requirement 11.3.2 only. It is one piece of evidence within a full compliance programme. Your acquirer or QSA will review it alongside your SAQ, network documentation, access controls, and other requirements. PCI SSC has confirmed this explicitly — any additional documentation an ASV provides (certificates, letters) is supplemental and not endorsed by PCI SSC as a replacement for the official scan templates.
Vulnerabilities with a CVSS score of 4.0 or above — classified as medium, high, or critical — must be remediated for a scan to pass under Requirement 11.2.2. Pure Denial of Service vulnerabilities, where CVSS Confidentiality and Integrity Impact are both "None," are explicitly excluded from failing criteria by the ASV Program Guide.
That depends entirely on your ASV. With Secusy ASV, pass certificates are delivered within 24 hours of a clean scan — no waiting on a manual review queue.

Share:

Related Post

 

Discover more from Secusy ASV

Subscribe now to keep reading and get access to the full archive.

Continue reading