Security Testing - Process

The goal of a penetration test also called ethical hacking, is to evaluate the current security status of IT systems. It is a controlled attack which uncovers security flaws in a realistic way.
As we are involved in the process, documentation should be done phase so that all the steps necessary to reproduce the attack are available readily which is the basis for the detailed report customers receive at the end of a penetration test.
These phases are re-iterated multiple times in a pentest phase which goes hand in hand with the normal SDLC.

Pentest Workflow



The four major phases of security Testing are the following. Click on each one of the phases to understand in detail.

1 comment: