1 minute read
Our Penetration Testing Methodology
Scoping Testing / Scanning
Our penetration testing team will work with you to understand your environment and map out your areas of risk. This will form the basis to define the scope and goals of the penetration test, including the systems and testing methods to be used.
Advertisement
We perform the testing methods to understand how the target environment responds to intrusion attempts. All testing is performed in line with the documented scope, and will only use testing methods that have been agreed.
Gaining & Maintaining Access
By exploiting any identified vulnerabilities, the testing will determine if they can be used to achieve a persistent presence in the system— long enough for a bad actor to gain in-depth access. This is to simulate real-world advanced persistent threats, which often remain in a system for months in order to steal sensitive data.
Analysis & Reporting
A comprehensive report is produced for the client, detailing the specifics of any vulnerabilities exploited, the type and location of data exposed and any other pertinent items. Recommendations for resolving any identified issues will be provided.