Penetration Testing FAQ
Penetration Testing FAQ
1
Penetration Testing Basics
What it is, why it matters, and how it differs from other security tools
What is penetration testing?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
What's the difference between a penetration test and a vulnerability scan?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
How often should a company get a penetration test?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
Is penetration testing disruptive to our operations?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
What's the difference between black box, gray box, and white box testing?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
2
Compliance & Audit Readiness
SOC 2, HIPAA, PCI DSS, ISO 27001, and passing your audit
Does Red Sentry's pentest satisfy SOC 2 requirements?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
Can one pentest cover multiple compliance frameworks?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
What does an auditor actually need to see from a penetration test?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
We have a compliance deadline in 30 days. Can Red Sentry help us in time?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
Do you provide a letter or certificate we can share with customers or partners?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
3
How Red Sentry Works
Our process, team credentials, and what makes us different
What does a Red Sentry engagement look like from start to finish?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
Who actually does the testing?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
What is PTaaS and how is it different from a traditional pentest?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
How is Red Sentry different from competitors like Cobalt or BreachLock?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
4
Types of Penetration Tests
Web application, network, cloud, API, and more
What types of penetration testing does Red Sentry offer?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
What's included in a web application penetration test?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
Do you test cloud environments like AWS or Azure?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
Can you test our APIs specifically?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
What's the difference between internal and external network testing?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
5
Pricing & Timeline
What it costs, what drives scope, and how fast you'll get results
How much does a penetration test cost?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
What factors affect the final price?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
How long does a penetration test take?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
Is retesting included in the price?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
6
Deliverables, Reporting & Platform
What you receive, how findings are tracked, and how Jira integration works
What does the final pentest report include?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
How does Jira integration work?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
Who on our team gets access to the PTaaS platform?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
Do you provide sample reports before we commit?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.
Can we access previous test results and track security improvement over time?
Yes, if they integrate with your environment. We assess vendor access points, SSO configurations, and data sharing pathways to identify where third parties create risk.