Послуги з імітації атак хакерів для вдосконалення процесів кібербезпеки.

Послуги з імітації атак хакерів для вдосконалення процесів кібербезпеки.

Simulated hacker attacks to improve cyber security processes.

Simulated hacker attacks to improve cyber security processes.

/ BLOG

Do mobile apps need to be tested to ensure compliance with PCI DSS 4.0 requirements?

Heading photo

Developing a mobile application is a crucial step in scaling any e-commerce project, bringing your brand closer to the consumer. However, once you integrate payment features, your app becomes more than just a digital catalog — it starts processing financial data. This milestone in business development is directly linked to compliance with PCI DSS — the primary data security standard for the payment card industry.
These rules exist to keep sensitive financial data safe whenever it is processed, sent, or stored. To verify compliance with these regulations, businesses must pass an audit — a comprehensive assessment of both organizational and technical processes. However, it is not enough for auditors to simply review documentation and server configurations; they need practical evidence that your application can survive a real attack.
This is exactly why penetration testing (pentesting) is required — a controlled, simulated attack performed by ethical hackers. The goal is to identify and fix vulnerabilities before real cybercriminals can exploit them.
Let's find out exactly when your product needs to meet these regulatory requirements.

When Does Your Application Enter the PCI Audit Scope?

Before implementing security measures, it is necessary to define the scope of the assessment. This boundary includes all technologies, processes, and people that handle payment data.
A mobile app is included in the audit scope if it:

    Handles or sends payment credentials (like card numbers or verification codes), even if the card data just passes through the client or server side in transit without being stored in a database.

    Uses external integrations to process transactions, specifically third-party SDKs, APIs, or embedded payment forms.

    Contains software modules where a vulnerability could directly or indirectly compromise the Cardholder Data Environment (CDE).

    Has access (via APIs or other channels) to the internal infrastructure segment where payment data is managed. A breach of this application creates a direct risk to the security of the entire payment infrastructure.

Keep in mind that using pre-built payment gateways or outsourcing development does not pass all PCI DSS responsibility to the vendor. In the eyes of your acquiring bank, your business remains the ultimate guarantor of security. Therefore, if a data breach happens, your company will be the one facing the financial and reputational consequences.

Why Basic Mobile OS Security Mechanisms Aren't Enough?

Bank terminals operate as closed systems designed to perform only financial operations. A customer's smartphone, however, is an open environment running dozens of different applications at the same time, and any of them might have vulnerabilities. Because your software shares resources with other programs, it simply cannot rely entirely on the device's operating system and requires additional protection.
There is a common misconception that "iOS and Android have built-in security features, and that is enough." While the operating system does protect the execution environment, it does not protect the app's actual code and logic.
Here is why relying only on the phone’s security is risky:

    A sandbox isolates your application from other programs, but it does not protect your code from reverse engineering. An attacker with a copy of the application file (APK or IPA) can analyze its business logic offline.

    On a rooted or jailbroken device, an attacker can bypass built-in OS security and gain full access to your application’s memory, file system, and network traffic.

    The OS cannot fix poor code: if a developer improperly implements the processing of cardholder data, the platform is unaware of the flaw and will not prevent an exploit.

    Integrated libraries and plugins are your responsibility, not Apple's or Google's. Any third-party component may contain unverified vulnerabilities.

This is exactly why Requirement 6.5 of PCI DSS 4.0 establishes mandatory secure coding practices. Mobile application security is something the development team must build from the inside out.

Why Do Auditors Require Pentest Results to Verify Security?

During a mobile application audit, the specialist looks for evidence that security is built into the core of your product, not just there by chance. They verify whether the company has a systemic approach to security: clear processes, team training, documents, and reports.
According to PCI DSS Requirements 6.3 and 6.5, a company must demonstrate that its developers are writing safe code. This means no hardcoded passwords, controlling the security of third-party SDKs, and preventing cardholder data from leaking into the smartphone's system logs. However, having the right processes and policies is just theory. Auditors need practical evidence that the defenses can withstand a real-world attack.
That’s why Requirement 11.4 makes it mandatory to conduct penetration testing (pentesting) at least once a year, and after any significant product update.
A pentest is a controlled assessment of an application performed by a team of ethical hackers. They act like real cybercriminals, using complex, multi-step scenarios in an attempt to bypass your security.
During the test, pentesters check your app from every angle, relying on recognized industry standards like the OWASP Mobile Top 10. The specialists evaluate:

    How easily the code can be subjected to reverse engineering to find sensitive data.

    Whether operating system security mechanisms and component configurations are being used correctly.

    The security of communications between the smartphone and the server (API), including resistance to data interception.

    Whether authentication and authorization mechanisms are correctly implemented, and if any vulnerabilities exist within the business logic.

The deliverable of a pentest is a detailed report that classifies the identified vulnerabilities by severity, explains the real-world impact of each, and provides exact steps to solve them. After receiving this document, the client must fix the identified issues.
Finally, the pentesters perform a retest to confirm that the reported problems can no longer be exploited, documenting the findings in a final report. This document is exactly what PCI DSS auditors want to see — it proves your app can survive a real, targeted attack.

What Are the Risks of Mobile Application Non-Compliance?

Ignoring PCI DSS requirements is a direct threat to business stability. If a payment data leak happens because of an application vulnerability, the company is entirely responsible.
The consequences begin with financial sanctions: international payment networks like Visa and Mastercard reserve the right to issue monthly fines that can amount to tens of thousands of dollars — and these will continue to accrue until the problem is completely fixed.
In the case of a confirmed card data breach, this is compounded by the costs of forensic investigations and compensation for affected customers. In the worst-case scenario, payment networks can pause or permanently ban the company's ability to accept payment cards.
However, the most severe impact is reputational. A public data breach scandal destroys user trust, which is incredibly difficult to rebuild. As a result, you might see customers leaving and a drop in sales — even after you’ve fixed the technical bugs.

IT Specialist Transforms Audits into a Managed, Stress-Free Process

The standard mandates an independent and professional assessment of your infrastructure. Our team of ethical hackers (Red Team) conducts penetration testing in strict accordance with all PCI DSS 4.0 requirements. We identify critical vulnerabilities before cybercriminals can exploit them.
Entrust your audit to the experts at IT Specialist!

Need expert advice?