Penetration Test
In this test, discovered vulnerabilities are actively exploited to determine an organization's exposure to risk.
While there is some overlap with a more general vulnerability assessment, in this case “audit” infers that there is a standard or compliance framework used as a basis for reviewing organizational assets and associated configurations.
This type of engagement often features “pass/fail” findings indicating whether resources adhere to requirements of the audit framework.
Includes a review of public-facing and internal applications for coding errors, insecure configurations, and architectural issues.
This is a network-wide review to determine what vulnerabilities may exist due to configurations, users, or at-risk applications and systems.
Copyright © 2023 Pulsar Security
| |