20.6: Use Vulnerability Scanning and Penetration Testing Tools in Concert

Use vulnerability scanning and penetration testing tools in concert. The results of vulnerability scanning assessments should be used as a starting point to guide and focus penetration testing efforts.

Asset Type

Security Function

Implementation Groups

N/A

N/A

2, 3

Dependencies

  • Sub-control 20.1: Establish a Penetration Testing Program

Inputs

  1. Penetration Testing Program document

Operations

  1. Manually review the Penetration Testing Program document (Input 1) to verify that it instructs the organization to use vulnerability scan results to inform penetration testing efforts. The presence or absence of this instruction becomes M1.

Measures

  • M1 = Boolean value indicating if the Penetration Testing Program document includes instructions for using vulnerability scan results to inform penetration testing efforts; 1 if instructions are included, 0 otherwise.

Metrics

Presence

Metric

Presence or absence of instructions to use vulnerability scan results to inform
penetration testing efforts

Calculation

M1