Network Segmentation Testing
Don't trust. Verify. Your network diagrams say the segments are isolated. Our adversarial probing, zone by zone, packet by packet, proves whether they actually are. We connect to each network segment and attempt to reach restricted systems using techniques your attackers would use: VLAN hopping, DTP negotiation, ACL bypass, and NAC evasion. If a path exists, we find it. Then we prove it in writing.
Why an Nmap scan is not segmentation testing.
Running a port scan between VLANs confirms basic reachability. It does not test DTP negotiation, double-tagging, ACL bypass, protocol traversal, or NAC evasion.
Segmentation Risk Profile
Network segmentation is the primary mechanism for containing breaches and reducing compliance scope. When it fails, everything is in scope.
PCI DSS v4.0.1 Requirement
Mandates segmentation penetration testing at least annually (merchants) or every six months (service providers).
Lateral Movement Rate
Of breaches involve lateral movement. Segmentation is the primary control that stops an attacker moving from the initial foothold to critical assets.
UK Breach Cost
Average cost of a UK data breach. Effective segmentation contains the blast radius and reduces the financial impact.
Controls
When Do Organisations Commission This Test?
Network segmentation testing is typically triggered by one of these six scenarios. If any of these apply, you are in the right place.
PCI DSS Req. 11.4.5 Compliance
Your QSA has cited Requirement 11.4.5 as outstanding. You need segmentation testing before your next Report on Compliance.
Post-Incident Lateral Movement
A recent breach or near-miss exposed lateral movement between segments. The board wants proof that boundaries hold.
Microsegmentation Investment Validation
You have deployed Illumio, NSX, or Guardicore. Your insurer or board wants independent validation, not vendor self-reporting.
IoT or OT Network Expansion
New IoT devices, guest networks, or OT zones have been added. You need to verify isolation before connecting them to production.
Merger, Acquisition, or Network Change
Network infrastructure has been merged, migrated, or restructured. Segmentation assumptions from the original design need independent verification.
Cyber Insurance Renewal
Your cyber insurance renewal requires evidence of network segmentation effectiveness. Our report provides the third-party validation underwriters require.
Isolation Methodology:
Beyond the Scan
Whether you need PCI DSS Requirement 11.4.5 compliance, Zero Trust validation, or independent verification that your network segregation controls hold under adversarial pressure, we test every source-to-destination zone boundary.
Discovery and Mapping
We scan the network from the perspective of the compromised segment, probing for leaky ACLs, misconfigured routes, and protocols that traverse VLAN boundaries. A single misconfigured ACL between your Developer VLAN and your Domain Controller gives an attacker domain admin without ever leaving the internal network.
VLAN Hopping and DTP Negotiation
We test for VLAN hopping vulnerabilities including DTP negotiation attacks (switch spoofing), double-tagging exploits against 802.1Q native VLANs, and trunk port misconfiguration. A single switch port with DTP enabled can allow an attacker to negotiate a trunk link and traverse every VLAN on the switch.
CDE Boundary Validation
Satisfies PCI DSS v4.0.1 Requirement 11.4.5 (previously 11.3.4) by confirming the Cardholder Data Environment is unreachable from out-of-scope networks. We test both ingress and egress CDE boundaries. QSA-ready report included. Annual testing for merchants, bi-annual for service providers.
IoT and OT Isolation
Can a compromised smart TV in the lobby reach your internal file servers? We test IoT VLAN boundaries, guest network isolation, IT/OT boundary integrity, and corporate network separation. For OT/SCADA environments, we coordinate with your operational team to schedule testing during planned maintenance windows.
Microsegmentation Validation
Vendor dashboards show policy coverage percentage. They cannot prove that policy enforcement prevents real lateral movement. We test Illumio, Guardicore, VMware NSX, and Cisco ACI with east-west lateral movement attempts across microsegmented boundaries.
Segmentation Matrix Report
A detailed source-to-destination zone connectivity matrix documenting every path tested, the expected result, what we found, the technique used, and remediation guidance. Structured for QSA review, board presentation, or cyber insurance validation with clear pass/fail verdicts per zone pair.
Source-to-Destination Zone Matrix
Every engagement delivers a connectivity matrix documenting each path tested, the expected result, and what we found. This is the deliverable your QSA will review.
| Source Zone | Destination Zone | Expected | Result |
|---|---|---|---|
| Guest Wi-Fi (VLAN 20) | Server VLAN (VLAN 10) | BLOCKED | FAIL |
| IoT VLAN (VLAN 30) | Domain Controller | BLOCKED | PASS |
| POS Terminal VLAN | Internet (NAT) | ALLOWED | PASS |
| Developer VLAN | Cardholder Data Env. | BLOCKED | FAIL |
| Corporate IT | OT/SCADA Network | BLOCKED | PASS |
Engagement Workflow
Structured to minimise operational friction. Testing can be coordinated with maintenance windows for sensitive environments.
Scope
We review your network architecture, segment inventory, and compliance requirements to define the testing boundary and rules of engagement.
Architecture Review
Reviewing network diagrams, firewall ruleset, and VLAN configuration to identify the intended traffic flow and locate legacy rules or misconfigurations that may already violate the segmentation design before active probing begins.
Adversarial Probing
We connect to each defined segment and attempt VLAN hopping, ACL bypass, protocol traversal, and NAC evasion to reach restricted segments. Every successful path is documented with evidence.
Report
Every confirmed boundary crossing is documented with screenshots and pcap captures. The final report is structured for QSA review, board presentation, or insurance audit with clear pass/fail verdicts per zone pair.
What You Get
Every network segmentation test includes the following deliverables, formatted for QSA review, board presentation, and cyber insurance submission.
Reports are delivered via our real-time penetration testing portal with role-based access. Also available in PDF and DOCX formats.
Transparent pricing.
Fixed-price quotes after a free scoping call. No day-rate surprises.
Standard Segmentation Test
3-5 network segments, PCI DSS CDE validation
Microsegmentation Validation
Illumio, NSX, Guardicore, Cisco ACI east-west testing
Enterprise / Multi-Site
Multiple VLANs, data centres, OT/IT boundary, multi-site
Close the Loop.
After the Test.
Segmentation testing validates your boundaries today. These services extend protection continuously: auditing the rules behind the segmentation, monitoring for policy drift, and testing the systems within each segment.
Scope a Combined EngagementInternal Network Pentest
Test the systems within each segment for vulnerabilities and lateral movement paths.
Firewall Configuration Review
Audit the underlying ruleset for ANY/ANY rules and legacy exceptions.
PCI DSS Compliance Testing
Full PCI DSS penetration testing and compliance assessment programme.
24/7 SOC Monitoring
Continuous monitoring for segmentation policy violations and lateral movement attempts.
Full Penetration Testing Catalogue
Comprehensive penetration testing services tailored to your environment.
Internal Testing
Post-perimeter assessments targeting Active Directory, lateral movement, privilege escalation, and segmentation validation from inside your network.
The best time to test your defences is now.
Join the high-growth companies relying on Precursor for continuous offensive and defensive security.
Frequently Asked Questions
Common questions about this service, methodologies, and deliverables.
Network segmentation testing typically costs between £3,500 and £8,000 depending on network complexity and number of segments to validate. A standard segmentation test for PCI DSS CDE validation (testing isolation between 3-5 network segments) averages £3,500 to £5,000 for 2-3 days of testing. Complex environments with multiple VLANs, data centres, microsegmentation platforms, or multi-site deployments typically cost £6,000 to £8,000. For PCI DSS buyers, £3,500 for segmentation validation is a fraction of the cost of full CDE scope expansion, which can triple compliance costs when segmentation controls fail. We provide fixed-price quotes after reviewing your network architecture and compliance requirements.
We connect a physical device or virtual machine to the specific network segment, for example the Guest VLAN or an IoT zone. We then attempt to identify and connect to assets in restricted segments (such as the Server VLAN or Cardholder Data Environment) using a range of adversarial techniques: VLAN hopping, DTP negotiation, ACL bypass, protocol traversal (mDNS, LLMNR), and NAC evasion. Every test attempt is logged with the tool used, the technique, and the outcome. The result is a source-to-destination zone connectivity matrix with clear pass/fail verdicts.
Yes. PCI DSS v4.0.1 Requirement 11.4.5 (previously Requirement 11.3.4 in v3.2.1) mandates that any organisation using network segmentation to reduce PCI scope must perform penetration testing to verify that segmentation is effective and operational. Merchants must test at least annually. Service providers, including managed service providers, payment processors, and SaaS platforms, must test every six months. Testing must validate both ingress and egress CDE boundaries, confirming no path exists between out-of-scope systems and the Cardholder Data Environment. Our segmentation testing report is structured for QSA review and RoC inclusion.
A network penetration test evaluates the security of systems within a network: vulnerabilities, misconfigurations, exploitable services. Segmentation testing evaluates whether network boundaries work as designed, specifically whether an attacker positioned in one segment can reach assets in another. The tests are complementary. In a typical engagement, an internal penetration test validates what can be compromised; segmentation testing validates whether the firewall rules and VLAN boundaries that are supposed to contain a compromise actually do. Many organisations run segmentation testing as a standalone exercise, particularly for PCI DSS CDE validation, rather than as part of a broader pen test scope.
For standard zone isolation testing, network-level access is sufficient. We connect to the source zone and attempt to reach the destination zone using custom packet crafting, without requiring credentials. For PCI DSS Requirement 11.4.5 compliance testing, this unauthenticated approach satisfies the requirement. Authenticated testing can be added to assess whether a compromised account in one zone could traverse segmentation boundaries using legitimate credentials. This is particularly relevant for Zero Trust and microsegmentation validation, where identity is a key enforcement dimension.
Typically, no. The scanning is targeted and low-bandwidth. We test for connectivity between zones, not load testing. Testing windows can be agreed in advance to avoid peak trading hours. For OT/SCADA environments, we coordinate with your operational team to schedule testing during planned maintenance windows or conduct testing at network level only to avoid any disruption to live processes.
Yes. We test whether your NAC solution, such as Cisco ISE, Forescout, or similar, correctly blocks unauthorised devices or moves them to a quarantine VLAN upon connection. NAC bypass is a common finding in segmentation engagements. We also test whether devices that bypass NAC can then reach restricted segments.
Yes. IT/OT boundary testing is one of the highest-stakes segmentation engagements we conduct. We verify the integrity of the air gap, or the segmentation controls where a true air gap has been replaced by managed connectivity, between the corporate IT network and the operational technology (OT) or SCADA environment. Our testing identifies unauthorised paths that would allow a compromise on the IT side to reach industrial control systems, historian servers, or engineering workstations. We work safely within OT environments, coordinating with your operational team to avoid any disruption to live processes.
Yes. We conduct independent validation of software-defined microsegmentation deployments across all major platforms: Illumio, Guardicore (Akamai), VMware NSX, and Cisco ACI. Vendor dashboards show policy coverage percentage. They cannot prove that policy enforcement prevents real lateral movement. Our testing assumes a foothold in one workload and attempts east-west movement across microsegmented boundaries, verifying that identity-based and application-aware policies are enforced at the workload level under adversarial conditions. The resulting report provides the independent third-party evidence required for board reporting and cyber insurance validation of your microsegmentation investment.
Segmentation testing is an active, adversarial engagement rather than a configuration review. We can combine segmentation testing with a firewall configuration assessment as part of a broader scope. Segmentation testing validates zone isolation at the network level; a firewall configuration assessment audits the underlying ruleset for overly permissive ANY/ANY rules, redundant policies, and legacy exceptions that undermine the design intent.



