Skip to main content
← All controls
CA-8 / A.8.8 / CIS-18.5 / PCI DSS 11.4 NIST SP 800-53 Rev 5

Do you run penetration tests at least annually against critical applications and infrastructure?

Demonstrate that the organization conducts annual penetration tests against critical assets, documents exploitable vulnerabilities, and remediates high-risk findings in a timely manner.

Description

What this control does

Penetration testing involves simulating real-world attacks against critical applications, systems, and network infrastructure to identify exploitable vulnerabilities before adversaries do. Testing must be conducted at least annually by qualified internal teams or third-party specialists using industry-standard methodologies such as PTES, OWASP, or NIST SP 800-115. The scope must cover externally-facing assets, privileged internal systems, and any applications processing sensitive data, with findings prioritized, remediated, and re-tested to validate closure.

Control objective

What auditing this proves

Demonstrate that the organization conducts annual penetration tests against critical assets, documents exploitable vulnerabilities, and remediates high-risk findings in a timely manner.

Associated risks

Risks this control addresses

  • Undetected exploitable vulnerabilities in critical systems allowing unauthorized access or privilege escalation
  • Configuration weaknesses or misconfigurations in public-facing infrastructure enabling remote compromise
  • Logical flaws or business logic bypasses in applications leading to data exfiltration or fraud
  • Insufficient security hardening of critical infrastructure components resulting in lateral movement opportunities
  • Inadequate patch coverage allowing exploitation of known CVEs in production environments
  • Failure to identify attack paths that combine multiple low-severity vulnerabilities into critical exposures
  • Lack of verification that compensating controls effectively mitigate known architectural weaknesses

Testing procedure

How an auditor verifies this control

  1. Obtain the current penetration testing policy and review requirements for frequency, scope, methodology, and qualifications of testers.
  2. Request and examine penetration test reports for the most recent twelve-month period covering all critical applications and infrastructure.
  3. Verify that the test scope included all assets classified as critical per the organization's asset inventory and risk assessment.
  4. Confirm that testing was performed by qualified personnel holding recognized certifications (e.g., OSCP, GPEN, CREST) or reputable third-party firms.
  5. Review the methodology documentation to ensure testing followed industry-standard frameworks (PTES, OWASP, OSSTMM, or NIST SP 800-115).
  6. Select a sample of high and critical severity findings from penetration test reports and trace each to corresponding remediation tickets or change records.
  7. Verify that remediation evidence (patches, configuration changes, code fixes) was validated through retesting or compensating control implementation.
  8. Interview the security team to confirm lessons learned from penetration tests are incorporated into vulnerability management and secure development processes.
Evidence required Penetration test reports from the past twelve months including executive summary, methodology, scope definition, and detailed findings with CVSS scores; asset inventory or scope document identifying critical applications and infrastructure; remediation tracking records (tickets, change requests, or tracking spreadsheets) linking findings to closure activities; retest validation reports or sign-off documentation confirming high/critical vulnerabilities were resolved; contracts or statements of work with third-party testing vendors; certifications or qualifications of internal or external penetration testers.
Pass criteria Penetration tests were conducted at least annually against all critical applications and infrastructure within the past twelve months, performed by qualified personnel using recognized methodologies, with documented remediation of all high and critical findings validated through retesting or compensating controls.