Penetration testing workspace in Application Vulnerability Response helps customers request for penetration test assessment request and track it using the workflow. It enables application owners to assess the security posture of their application. It is the manual testing of an application by the ethical hacking team.

Roles required

Penetration testing requires the following roles:

sn_vul.app_pen_tester: Represents a pen tester who is responsible to create pen test findings as part of the application penetration testing.

sn_vul.app_pen_test_requester: select record for action: sn_vul.app_pen_test_requester.

Lifecycle of Penetration Testing

As an application owner, you can request the ethical hacking team for a penetration test assessment of your application. The ethical hacking team acts on this request and creates penetration test findings. These findings are manually created Application Vulnerable Items (AVIs).

The penetration testing workflow covers the penetration testing life cycle from raising the testing request to resolving the findings of the ethical hacking team.