Penetration testing is not a single service — it's a category of security assessments that can target different parts of your environment using different methods. Choosing the right type of test for your situation determines whether you get meaningful security insights or a report that misses your actual risk.
This guide covers the main types of penetration testing, when each is appropriate, and how compliance requirements map to specific test types.
External network testing targets your internet-facing infrastructure — the systems visible from the public internet. This is where most attackers begin: probing your perimeter to find a way in.
What it covers:
When it's appropriate: Any organization with internet-facing infrastructure. External testing is the baseline — if you do nothing else, start here. It is required by PCI DSS Section 11.4, expected by NIS2 regulators, and asked for by most cyber insurers.
What it doesn't cover: Threats from inside the network — for that, you need internal testing.
Internal testing simulates an attacker who has already gained access to your network — whether through a phishing attack, a compromised VPN credential, a rogue device, or physical access. The question it answers: once inside, how far can an attacker go?
What it covers:
When it's appropriate: Organizations that handle sensitive data, operate critical services, or are subject to NIS2, DORA, or PCI DSS. Internal testing is required by PCI DSS Section 11.4 and is standard for any comprehensive security program. It is also essential after a suspected breach — to determine how far an attacker may have moved.
Web application testing targets your browser-accessible applications — customer portals, SaaS platforms, internal tools, APIs, and e-commerce infrastructure. Web applications are the most targeted attack surface for most organizations because they're accessible to anyone with a browser.
What it covers (following OWASP Testing Guide):
When it's appropriate: Any organization that operates customer-facing web applications, processes payments online, or exposes APIs to third parties. Required by PCI DSS Section 6.2.4 for applications that handle cardholder data. Expected in SOC 2 programs and under NIS2 for digital service providers.
Web application testing can be conducted as a standalone engagement or combined with external network testing for full perimeter coverage.
APIs have become the primary attack surface for many modern applications — particularly SaaS platforms, fintech services, and mobile-backed applications. API testing focuses specifically on the interfaces between systems, where authorization flaws and data exposure are most common.
What it covers:
When it's appropriate: Organizations building or operating API-heavy platforms, particularly those in fintech, healthcare technology, SaaS, and any sector subject to DORA or NIS2 where third-party connectivity must be validated.
Cloud environments — AWS, Azure, GCP — introduce a different category of misconfiguration and privilege escalation risks compared to traditional on-premise infrastructure. Cloud penetration testing evaluates your cloud architecture for weaknesses specific to the cloud model.
What it covers:
When it's appropriate: Any organization operating workloads in public cloud. Cloud misconfigurations are consistently among the leading causes of data breaches — yet many organizations have never had their cloud posture independently tested.
Technical controls are only as strong as the humans who operate them. Social engineering testing evaluates whether employees can be manipulated into disclosing credentials, clicking malicious links, or allowing unauthorized physical access.
What it covers:
When it's appropriate: Organizations seeking to assess human-layer risk alongside technical controls, or those required to demonstrate security awareness program effectiveness under NIS2 or ISO 27001.
TLPT and red team exercises are the most advanced form of adversarial simulation. Rather than testing against a defined vulnerability list, they use real threat intelligence to simulate the specific TTPs (tactics, techniques, and procedures) of threat actors known to target your sector.
What distinguishes it from standard pentesting:
When it's required: TLPT is mandated under DORA for financial entities designated as significant by national competent authorities. It is also used by organizations seeking the most realistic assessment of their resilience. Read our full guide on DORA TLPT requirements.
| Framework | Required Test Types | Frequency |
|---|---|---|
| PCI DSS 4.0 | External network, internal network, application layer, segmentation testing | Annual (segmentation: 6-monthly for service providers) |
| NIS2 | Risk-based; typically external + internal network, web applications | Annual (best practice); triggered by significant changes |
| DORA | Annual: external network, internal, application; TLPT for designated entities | Annual basic; TLPT every 3 years |
| ISO 27001 | Risk-based; external + internal + application typically expected by auditors | Annual (risk-based determination) |
| SOC 2 Type II | Aligned to system boundary; typically external + application | Within observation period (recommended annual) |
The right combination of test types depends on your risk profile, infrastructure, and compliance obligations. As a general guide:
Q-Sec's compliance consulting team can map your specific obligations across frameworks and recommend the most efficient test scope — rather than defaulting to the most expensive option.
Yes — and for most organizations, a combined engagement is more cost-effective than separate tests. A single engagement covering external network, internal network, and web application testing can generate evidence for NIS2, ISO 27001, and PCI DSS simultaneously, with one scoping call, one reporting cycle, and one fixed fee. Q-Sec structures engagements to maximize compliance coverage per euro spent.
Web application testing covers the full browser-accessible application, including its frontend, authentication, and business logic. API testing focuses specifically on the machine-readable interfaces — REST or GraphQL endpoints — that may not be visible through a browser but carry significant data. Modern applications often warrant both: Q-Sec includes API testing as part of web application engagements where APIs are in scope.
No. A focused external network test is better than no test at all, and for many mid-sized organizations it's the right starting point. The key is to match the scope to your actual risk — not to buy the most comprehensive option available. Q-Sec works with organizations of all sizes; our pricing is flat-fee and scoped to what you actually need.
Not sure which type of penetration test your organization needs? Q-Sec offers a free scoping call to identify your actual risk exposure and compliance requirements — without overselling scope.
Contact team@q-sec.com or visit q-sec.com/services/penetration-testing