December 8, 2023

While going through penetration testing process, its worthwhile to post on standards and framework been followed . Below are few standards that getting followed in Penetration Testing process.


The OSSTMM (Open Source Security Testing Methodology Manual) is a recognised framework that details industry standards. The framework provides a scientific methodology for network penetration testing and vulnerability assessment. The OSSTMM methodology enables penetration testers to perform customized testing that fits the technological and specific needs of the organization. Based on the outcome decision can be made.


The OWASP (Open Web Application Security Project) is another recognized standard that powers organizations to control application vulnerabilities. This framework helps identify vulnerabilities in web and mobile applications. At the same time, the OWASP also complicates logical flaws arising in unsafe development practices. It has over 66 controls to identify , assess Vulnerabilities found in the Application. By adopting this standard Zero Vulnerabilities can be ensured and it’s realistic


The NIST (National Institute of Standards and Technology) varies information security manuals that differ from other information security manuals.NIST offers more specific guidelines intrinsic to penetration testing to improve the overall cybersecurity of an organization. The framework guarantees information security in industries like banking, communications, and energy. There is a probability of customizing the standards to meet their specific needs.These guidelines ensure that the organizations fulfill their cybersecurity obligations and mitigate risks of possible cyberattacks.


The PTES (Penetration Testing Methods and Standards) tells a structured approach to a penetration test. The PTES guides you through the phases of penetration testing, beginning with communication, information gathering, and threat modeling phases. PTES provides guidelines to the testers for post exploitation testing.The standard has seven phases that guarantee successful penetration testing with recommendations to rely on. 


The ISSAF (Information System Security Assessment Framework) is a specialized and structured approach to penetration testing. This framework provides advanced methodologies that are personalized to the context. These standards allow a tester to plan and execute every step of the penetration testing process. Thus, it caters to all the requirements of the penetration testing process. It offers additional information concerning various attack vectors, as well as vulnerability outcome after exploitation. All this information allows testers to plan an advanced attack that guarantees a return on investment while securing systems from cyberattacks

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.