ID.IM-02.183
Does your organization conduct penetration testing on high-risk systems with leadership approval?
Explanation
Penetration testing involves simulating real-world attacks to identify vulnerabilities in high-risk systems before malicious actors can exploit them. These tests should be conducted on systems that contain sensitive data or are critical to operations, with proper authorization from leadership to ensure awareness and support of the testing activities. Evidence could include a penetration testing policy document, recent penetration test reports for high-risk systems, documentation of leadership approval for testing, and remediation plans addressing identified vulnerabilities. These documents should demonstrate a systematic approach to identifying and addressing security weaknesses in critical systems.
Implementation Example
Perform penetration testing to identify opportunities to improve the security posture of selected high-risk systems as approved by leadership
ID: ID.IM-02.183
Context
- Function
- ID: IDENTIFY
- Category
- ID.IM: Improvement
- Sub-Category
- Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties

