Skip to main content

Penetration Testing

Overview

The Penetration Testing module helps you plan, execute, and track penetration testing campaigns. Penetration testing is included in every Bastion subscription — your vCISO coordinates the engagement, and Bastion's OSCP-certified pentesters carry out the tests. Findings are reported directly into the platform for tracking and remediation.

Why Penetration Testing?

Beyond Automated Scanning

  • Human Intelligence - Creative attack paths
  • Business Logic - Application-specific flaws
  • Chained Attacks - Multi-step exploits
  • Real-World Validation - Proof of exploitability

Compliance Requirements

Many frameworks require pentesting:

FrameworkRequirement
SOC 2Periodic testing
ISO 27001Regular testing
HIPAATechnical evaluation

Campaign Management

Creating a Campaign

  1. Navigate to InfrastructurePenetration Testing
  2. Click Create Campaign
  3. Configure:
    • Campaign name
    • Scope definition
    • Start/end dates
    • Pentester assignment
  4. Save

Campaign Types

TypeScopeDuration
Web ApplicationSpecific application1-2 weeks
NetworkInternal/external network1-2 weeks
MobileMobile applications1-2 weeks
CloudCloud infrastructure1-2 weeks
FullComprehensive3-4 weeks

Scope Definition

Define what's in scope:

  • Target domains/IPs
  • Applications
  • Authentication credentials
  • Out-of-scope exclusions
  • Testing restrictions

Pentester Portal

Portal Access

External pentesters access via dedicated portal:

  1. Navigate to SettingsPentester Portal
  2. Click Invite Pentester
  3. Enter pentester email
  4. Assign to campaign
  5. Send invitation

Portal Features

Pentesters can:

  • View scope and rules
  • Submit findings
  • Upload evidence
  • Communicate with team

Portal Permissions

PermissionAccess
ViewSee campaign details
SubmitSubmit findings
CommentAdd comments
UploadAttach evidence

Finding Management

Submitting Findings

Pentesters submit findings with:

FieldDescription
TitleBrief description
SeverityCritical, High, Medium, Low
DescriptionFull details
Steps to ReproduceExploitation steps
EvidenceScreenshots, videos, logs
RecommendationRemediation guidance

Finding Workflow

Submitted → Triaged → Confirmed → In Progress → Fixed → Verified → Closed

Finding Review

When findings are submitted:

  1. Review for accuracy
  2. Assess severity
  3. Confirm exploitability
  4. Assign to remediation team
  5. Track resolution

Evidence Management

Evidence Types

  • Screenshots
  • Video recordings
  • Request/response logs
  • Exploit code (redacted)
  • Tool output

Evidence Storage

Evidence is:

  • Encrypted at rest
  • Access controlled
  • Retention managed
  • Audit logged

Reporting

Campaign Report

At campaign completion:

  • Executive summary
  • Finding summary
  • Detailed findings
  • Remediation status
  • Trend comparison

Report Formats

FormatUse Case
ExecutiveLeadership briefing
TechnicalEngineering team
ComplianceAudit evidence

Remediation Tracking

Tracking Progress

Monitor remediation:

  • Open findings by severity
  • SLA compliance
  • Aging findings
  • Remediation velocity

Retest Coordination

Coordinate retesting:

  1. Mark finding as fixed
  2. Request retest
  3. Pentester validates
  4. Confirm or reopen

Campaign History

Past Campaigns

View completed campaigns:

  • Campaign details
  • All findings
  • Remediation status
  • Reports

Trend Analysis

Track improvements:

  • Finding counts over time
  • Severity trends
  • Time to remediation
  • Recurring issues

Integration

Issue Integration

Findings sync with Issues module:

  • Automatic issue creation
  • Status synchronization
  • Unified remediation tracking

Best Practices

Test Regularly

Annual testing is minimum. Quarterly is better. After major changes is essential.

Define Scope Clearly

Ambiguous scope leads to missed vulnerabilities or wasted time. Be specific.

Communicate Continuously

Regular communication with pentesters ensures focus on priorities.

Track Remediation

Pentests are only valuable if findings are fixed. Track to completion.

Next Steps