Answer:
Performing an intrusion test against your third party processor's equipment is a valid component in periodic network security monitoring. The goal is to assure that their deployed configuration fully meets your written policy. Their policy is immaterial but their configuration controls compliance with your policy.