Penetration testing is a vital element of any cybersecurity program. A pen test will identify existing weaknesses that hackers could exploit to compromise your sensitive data. Most security frameworks like HIPAA, PCI DSS, and FISMA require penetration testing, making it a vital part of your compliance efforts. With growing threats, increasing attack sophistication, mandates for security compliance, and the pressure to protect corporate data, organizations must be sure their defenses function as designed. The best way to accomplish this is through active testing of your systems in a way that mimics malicious actors.

CompliancePoint’s Penetration Testing methodology involves a comprehensive analysis of publicly available information about your target systems and configuration documentation. This information gathering can be done with information provided by your staff (white box testing) or without (black box testing). Our testing includes a mix of manual and automated techniques to identify vulnerabilities and understand the overall security impact for the target system.

Simply, CompliancePoint's ethical hacking experts will conduct manual penetration testing that will identify areas of exposure that may be missed by more automated testing processes.

CompliancePoint offers on-demand and ongoing penetration testing engagements to best align with your customers’ risk profile and compliance needs.

We use the following approach to provide industry-leading penetration testing approach:

Our Focus

CompliancePoint's qualified security consultants will conduct internal and external pen testing of the following areas:

Network

Our experts will attempt entry through the routers, switches, firewalls, load balancers, and any additional networking infrastructure you have in place to connect your systems.

Platform

Our experts will enter the servers (i.e. Windows, Linux, etc.) in an attempt to penetrate any exposed services like authentication, file transfer, and file shares.

Application

Our experts will conduct testing against specific applications to identify existing vulnerabilities and enable you to protect the data held within those applications.

Wireless

The Wireless Penetration Test is designed to mimic attempted entry through the Wi-Fi connections and any wireless infrastructure you have in place to connect your systems.

 

Phishing & Social Engineering

With our Phishing Penetration Test, our experts will use ethical tactics to phish your staff through email, phone, in-person, and/or social media as a method of identifying modern social threats and arming your organization against them.

Our Focus

CompliancePoint's qualified security consultants will conduct internal and external pen testing of the following areas:

Network

Our experts will attempt entry through the routers, switches, firewalls, load balancers, and any infrastructure you have in place to connect your systems.

Platform

Our experts will enter the servers (i.e. Windows, Linux, etc.) in an attempt to penetrate any exposed services like authentication, file transfer, and file shares.

Application

Our experts will conduct testing against specific applications to identify existing vulnerabilities and enable you to protect the data held within those applications.

Wireless

The Wireless Penetration Test is designed to mimic attempt entry through the Wi-Fi connections and any wireless infrastructure you have in place to connect your systems.

 

Phishing & Social Engineering

With our Phishing Penetration Test, our experts will use ethical tactics to phish your staff through email, phone, in-person, and/or social media as a method of identifying modern social threats and arming your organization against them.

Our Benefits

Objective & knowledgeable assessments
Proven techniques and strategies
Cost savings
Target high-priority tasks

Access to cutting-edge tools & technology
Avoid staffing challenges
Education & awareness
Program benchmarking

Objective & knowledgeable assessments
Proven techniques and strategies
Cost savings
Target high-priority tasks
Access to cutting-edge tools & technology
Avoid staffing challenges
Education & awareness
Program benchmarking

Our Certifications

 

CRPT

 

CREST CRT

 

eCPPT

 

GPEN

OSCP

 

OSCE

 

OSWP

 

PenTest+

 

Our Certifications

• CRTP
• CREST CRT
• eCPPT
• GPEN
• OSCP
• OSCE
• OSWP
• PenTest+

Get started with Penetration Testing

Learning More About Pen Testing

Scope and Rules of Engagement

Before penetration testing begins, organizations need to work with their tester to develop a project scope that addresses your organization’s goals for the test. Be sure the tester understands what systems, networks, and applications must be included. Provide your tester with the most accurate and current information about your testing environment, IP addresses, URLs, etc.

Rules of engagement (ROE) set guidelines and boundaries for penetration testers during their assessment of the system or network. These rules are crucial for ensuring that the testing process is conducted in a controlled and ethical manner.

Organizations should use the ROE to specify the actions allowed during the pen test and set boundaries for the tester. Some constraints often laid out in an ROE include:

  • Time windows for testing
  • Areas of the organization that can’t be disrupted
  • Systems or information that are off-limits for testing

Communication protocols can also be established in the ROE.

Reporting

When the penetration test is complete, organizations should expect a comprehensive report with the following information:

  • A description of the tools, techniques, and procedures employed during the test
  • An explanation of how the testing team approached the assessment
  • Detailed documentation of all vulnerabilities discovered, categorized by severity
  • Information on how each vulnerability was exploited
  • Evidence, such as screenshots or logs, to support the findings
  • Evaluation of the potential impact and likelihood of exploitation for each vulnerability
  • Specific, actionable steps to remediate identified vulnerabilities
  • Prioritization of recommendations based on risk severity