Penetration Testing Methodology: (Company Name)
Penetration Testing Methodology: (Company Name)
METHODOLOGY
[Company Name]
Document Owner:
Effective Date:
Updated:
Disclaimer: This sample policy has been provided by Apptega, Inc. as a generic document to support the
development of your compliance program. It is unlikely to be complete for your organization without
customization. This is document is not legal advice and Apptega is not a registered CPA firm.
Penetration Testing Methodology
Version 1.0
[Updated Date]
[Company Name]
Penetration Testing Methodology
Effective Date: Document Owner:
Revision History
Revision Rev. Date Description Prepared By Reviewed By Date Approved By Date
1.0
1. Purpose................................................................................................................................................2
2. Penetration Testing Methodology.......................................................................................................2
2.1 Planning and Preparation................................................................................................................2
2.2 Information Gathering and Analysis................................................................................................3
2.3 Detection of Vulnerabilities.............................................................................................................3
2.4 Penetration Attempt and Exploitation.............................................................................................4
2.5 Analysis and Reporting....................................................................................................................4
3. Penetration Testing Clean Up..............................................................................................................4
4. Roles and Responsibilities....................................................................................................................4
5. Definitions and Terms..........................................................................................................................5
CONFIDENTIAL
Penetration Testing Methodology
Version 1.0
[Updated Date]
1. Purpose
1.1 <Company> depends on the security of its Information Technology (IT) infrastructure.
Without security, the privacy of information and the integrity of the IT infrastructure
may be subject to compromise and place the business at risk, such as financial
damages or loss of reputation. This infrastructure is therefore a critical business element,
which must be protected with effective and efficient security tools and methods based
on industry standards. As a result, penetration tests should be performed to
d e t e r m i n e a n d analyze the security threats and vulnerabilities to its information
assets and to explore options that will mitigate associated information risks.
1.2 A Penetration test is an authorized attempt to compromise <Company> IT infrastructure to
check for vulnerabilities or gaps in security and functionality of systems. Usually penetration
testing involves the use of attacking methods conducted by trusted individuals that are
similar to the tools hackers and intruders use. Depending on the type of test that is
conducted, this may involve a simple IP address scan to identify systems offering services
with known vulnerabilities (passive testing) or exploiting known vulnerabilities that exist in
an unpatched operating system (active testing). Results of the conducted tests are
documented and presented to the system owner and the vulnerabilities identified can then
be fixed. Pen testing must be conducted regularly as system threats and vulnerabilities
change over time. Information provided by the penetration test should be used to enhance
the company’s security policies and patch any found vulnerabilities. Additionally, results
from tests help management prioritize remediation based on which vulnerabilities are
actually exploitable and to what degree providing a more accurate representation of the
likelihood and impact of the risk.
CONFIDENTIAL
Penetration Testing Methodology
Version 1.0
[Updated Date]
Throughout the planning phase discuss the timing and duration the penetration tests are
performed. This is important in making sure normal business operations are not disrupted
throughout testing. The company must understand what systems or networks are being tested,
the capacity and capability of the system, and the users effected. The penetration testers should
have a great understanding of the company’s expectation, needs and infrastructure before
creating a testing plan. Testing plans should be discussed and approved by company
management before conducting testing procedures. An organization should decide if they want
to inform their employees of the testing or not. Upon making this decision instructions should
be communicated and clearly defined to employees if deemed necessary.
Penetration testing involves conducting authorized illegal activities on external and internal
company systems or networks. Understand that any information or data obtained during testing
will be treated as confidential and will be returned or destroyed upon completion and according
to plan. Legal and regulatory documents understanding the risks and procedures must be signed
by company executives before penetration testing begins. An emergency contact should be
assigned and available at all times during the pen test and status meetings should be scheduled
if necessary.
CONFIDENTIAL
Penetration Testing Methodology
Version 1.0
[Updated Date]
CONFIDENTIAL
Penetration Testing Methodology
Version 1.0
[Updated Date]
Term Definition
CONFIDENTIAL