Penetration testing
1. Vulnerability assessment
- Check of all systems that are accessible externally (from the Internet) (once or periodically)
- Periodic reviews to check implementation measures
- Clear report in PDF format with summary and detailed description of findings
- Immediate communication if critical vulnerabilities are identified
2. Penetration test
- Based on the results of the vulnerability assessment
- Detailed and case-related parameterised security scan
- Using uncovered vulnerabilities and misconfigurations