Skip to main content
Penetration Testing | Q-Sec
Penetration Testing

Know your real risk.
Before attackers do.

Q-Sec Penetration Testing goes beyond checklists. It combines compliance alignment, resilience validation, and expert-led exploitation to give your organisation clear, actionable evidence of where you stand — and exactly what to fix.

Compliance-Ready Testing
🛡️
NIS2
Directive alignment
⚖️
DORA
Resilience testing
🔒
ISO 27001
Control validation
📋
GDPR
Data exposure testing
💳
PCI DSS & SOC 2
Payment & trust service criteria
Methodology
OWASP Testing Guide PTES NIST 800-115 MITRE ATT&CK SANS Top 25 OWASP API Top 10
Integrated Security Testing

Pentesting as part of your security posture — not a one-off box to tick

Standalone vulnerability scans tell you what exists. Q-Sec penetration testing tells you what can be exploited, in what order, by whom — and what it would mean for your business. Every engagement is designed to support your wider security and compliance programme.

Supports your compliance programme
Evidence-backed testing mapped to NIS2, DORA, ISO 27001, GDPR, PCI DSS, and SOC 2 requirements.
Strengthens incident readiness
Optional SOC detection validation and attack-defence tabletop exercises available alongside every engagement.
Informs risk management and governance
Risk-ranked findings with business impact context — ready for board reporting, cyber insurance, and client due diligence.

Integrated with

  • Continuous Monitoring (SOC / SIEM) Live
  • Incident Response Readiness Validated
  • NIS2 / DORA / ISO 27001 / GDPR Mapped
  • Risk Management & Governance Board-ready
  • PCI DSS & SOC 2 Compliance Audit-ready
Who Benefits

Value for every decision-maker

Q-Sec findings are translated into the language each stakeholder needs — from exploitable attack paths for your security team to business risk and competitive impact for the board.

CEO / Board
🏛️
Demonstrable due diligence

Executive-ready reporting provides clear visibility of real business risk and supports strategic decisions on cyber investment. Confidence in resilience — without needing to understand the technical detail.

CFO / Finance
💼
Controlled financial exposure

Quantified risk findings reduce the likelihood of a costly breach or regulatory fine. A stronger cyber insurance position and predictable, prioritised remediation roadmap protect your budget.

CISO / Head of IT
🔐
Actionable technical improvements

Exploitable gaps identified and validated with proof-of-concept evidence. Risk-ranked remediation guidance prioritised to your environment — not a raw CVSS list.

Compliance & Risk
📋
Audit-ready documentation

Reports directly support alignment with NIS2, ISO 27001, DORA, GDPR, PCI DSS, and SOC 2. Independent security validation and clear evidence of control effectiveness for your next audit.

Sales & Business Development
🚀
Stronger market credibility

Faster enterprise procurement cycles when you can evidence your security posture. Competitive differentiation with an attestation letter for client due diligence and RFP processes.

IT & Security Teams
🛡️
Reduced breach likelihood

Improved ransomware and lateral movement resilience. Reduced likelihood of disruptive incidents backed by real-world exploitation evidence — not theoretical risk scores.

Testing Domains

What we test

Comprehensive coverage across every layer of your attack surface — from internet-facing applications to cloud infrastructure, identity systems, and human factors.

01
🌐
Web & API Security Testing

OWASP Top 10 and API Top 10 coverage. Authentication, authorisation, injection, business logic, and data exposure flaws.

02
🔌
Network Testing (Internal & External)

Perimeter assessment, internal segmentation validation, firewall review, and lateral movement paths.

03
☁️
Cloud Security Testing

Azure, AWS, and GCP misconfigurations, IAM policy review, storage exposure, and serverless security assessment.

04
🏢
Microsoft 365 & SaaS Security

Tenant misconfiguration, conditional access gaps, email security, and data exposure across M365 and connected SaaS platforms.

05
🔑
Active Directory Assessment

Privilege escalation paths, Kerberoasting, pass-the-hash, BloodHound attack paths, and domain dominance scenarios.

06
🎣
Phishing & Social Engineering

Simulated phishing campaigns, vishing assessments, and credential harvesting tests against your workforce.

07
🔴
Red Team & Adversary Simulation

Goal-based, multi-phase adversary simulation mapped to MITRE ATT&CK — designed to test people, process, and technology together.

08
💻
DevSecOps & Source Code Review

White-box architecture review, secure code analysis, SAST integration support, and CI/CD pipeline security assessment.

Testing Approach

Methodology matched to your risk

We select the right approach based on your business objectives, regulatory requirements, and risk tolerance. Most engagements start with a scoping call — no pressure, no jargon.

Most Common for SMEs
Black Box
External attacker simulation

No prior knowledge. Our testers approach your environment exactly as a real attacker would — testing what an outsider can reach, exploit, and escalate from. Ideal for validating your perimeter, web applications, and internet-exposed assets.

✓ Best for: perimeter, web, and internet-exposed assets
Balanced Coverage
Grey Box
Compromised insider simulation

Simulates a compromised user account or limited insider access — the most realistic scenario for ransomware and insider threat paths. We test lateral movement, privilege escalation, and data access from a foothold inside your environment.

✓ Best for: internal networks, AD, ransomware validation
DevSecOps & Deep Review
White Box
Full visibility testing

Full architecture visibility, including source code review and design-level analysis. Maximises depth for critical applications and DevSecOps environments where understanding every risk is more important than simulating surprise.

✓ Best for: critical applications, secure SDLC, deep audit evidence
Engagement Process

Six phases. Total clarity.

Every Q-Sec engagement follows a structured, transparent process. You always know what we're doing, why we're doing it, and what comes next.

01
Scoping & Risk Alignment

We define business-critical assets, regulatory drivers, and attack scenarios together. Clear scope. Clear objectives. No ambiguity before we begin.

Stakeholder Input
02
Reconnaissance & Intelligence Gathering

Passive and active mapping of your external exposure and internal attack surface. Open-source intelligence, service enumeration, and footprinting.

OSINT & Discovery
03
Vulnerability Identification

Manual and automated testing across your applications, infrastructure, and cloud systems. We validate every finding before it enters the report.

Manual + Automated
04
Controlled Exploitation

Safe proof-of-concept exploitation to validate real impact. No guessing. We demonstrate — and document — what an attacker would actually achieve.

Safe PoC Evidence
05
Impact & Lateral Movement Analysis

We assess privilege escalation paths, data exposure risk, and ransomware feasibility — the business impact of each finding, not just its CVSS score.

Business Risk Context
06
Reporting & Executive Briefing

Actionable remediation guidance, risk prioritisation aligned to your reality, and an executive briefing for management — plus a developer walkthrough and optional retest.

Dual-audience Report
Typical Engagement

From first call to final report in 3–4 weeks

Every engagement has a clear owner, a defined schedule, and no surprises. Here's what a standard targeted pentest looks like from your side.

Pre-engagement Days 1–3
Week 1 Discovery & Recon
Week 2–3 Active Testing
Week 3–4 Reporting
Post-delivery Support & Retest
Q-Sec Team
Scoping call · NDA · Rules of engagement
Recon · OSINT · Surface mapping
Exploitation · Lateral movement · PoC development
Report writing · Risk classification · QA review
Retest (optional) · Remediation Q&A
Your Team
Approve scope · Share access details
Minimal involvement
Standby for critical findings
Executive briefing · Dev walkthrough
Remediation · Retest sign-off
Deliverables
Scope & rules of engagement document
Critical findings flagged in real time
Final report + executive summary delivered
Retest report + attestation letter (if requested)
Critical finding protocol
If we discover a critical vulnerability during testing, we notify your designated contact immediately — before the final report. You're never the last to know.
Minimal disruption
Testing is conducted within agreed windows. All proof-of-concept exploitation is safe and non-destructive. Production systems remain stable throughout.
Timeline flexibility
Timelines are adjusted to your audit, procurement, or board reporting deadlines. We plan backwards from your required delivery date.
Standards & Frameworks

Aligned to recognised standards. Mapped to your compliance.

Testing Methodologies
  • OWASP Testing Guide
  • OWASP Top 10 & API Top 10
  • PTES (Penetration Testing Execution Standard)
  • NIST 800-115
  • MITRE ATT&CK Framework
  • SANS Top 25
Compliance Frameworks Supported
  • NIS2 Directive
  • DORA (Digital Operational Resilience Act)
  • ISO 27001 Information Security
  • GDPR Data Protection
  • PCI DSS Payment Card Security
  • SOC 2 Trust Service Criteria
Service Models

Targeted or continuous — you choose

Whether you need a single, well-scoped engagement for an upcoming audit or ongoing validation as your environment evolves, Q-Sec fits your model.

Project-Based
Targeted Pentest

Ideal for SMEs preparing for audits, client onboarding, or regulatory reviews.

  • Defined scope: web, cloud, AD, SaaS, or network
  • Technical and executive-ready reports
  • Risk prioritisation matrix aligned to SME reality
  • Remediation roadmap with clear guidance
  • Compliance-ready documentation
  • Attestation letter available on request
  • Typical duration: 2–4 weeks depending on scope
Subscription-Based
Continuous Security Validation

Designed for growing organisations needing ongoing risk management.

  • Quarterly or bi-annual testing cycles
  • Continuous vulnerability discovery
  • Risk trending and remediation tracking over time
  • Security advisory workshops included
  • Remediation consultation sessions
  • Alignment with evolving regulatory requirements
  • Dedicated Q-Sec security advisor
Team & Deliverables

What you get — and who delivers it

Certified ethical hackers with hands-on cloud and infrastructure expertise. Every report is reviewed, every finding validated, every recommendation practical.

The Final Report
  • Executive summary for management
  • Detailed vulnerability descriptions with proof-of-concept evidence
  • Exploit methodology and attack path diagrams
  • Risk severity classification (CVSS + business context)
  • Clear remediation guidance and references to security best practices
  • Compliance mapping (NIS2, DORA, ISO 27001, GDPR)
Briefings & Walkthroughs
  • Developer-focused walkthrough session — vulnerabilities explained with remediation steps
  • Technical deep-dive with your development or security team
  • Executive management presentation on findings, business impact, and strategic recommendations
  • Optional: attack-defence tabletop simulation
  • Optional: SOC detection validation exercise
Post-Engagement Support
  • Retest to validate that identified vulnerabilities have been properly fixed
  • Remediation consultation sessions with Q-Sec engineers
  • Attestation letter for clients or audit evidence (on request)
  • Risk prioritisation roadmap aligned to your budget and timeline
  • Integration with your existing compliance and risk management programme
2–4
weeks typical duration
100%
manually validated findings
reporting layers (exec + technical)
6+
compliance frameworks supported
Compliance Auditor Perspective

What your auditor actually needs from a pentest

A penetration test that satisfies your security team but fails to produce the right evidence can still leave you exposed at audit. Q-Sec designs every engagement with the auditor's checklist in mind — because we've been on both sides of that table.

ISO 27001 : 2022

Information Security Management

ISO 27001 does not mandate penetration testing by name — but Annex A control 8.8 (Management of Technical Vulnerabilities) and control 8.29 (Security Testing in Development and Acceptance) together require documented technical testing as evidence that controls are not just implemented, but operating effectively.

Auditors conducting Stage 2 assessments or surveillance audits will look for a closed loop: a test was scoped, conducted, findings were risk-ranked, remediation was tracked to closure, and management reviewed the outcome. A raw report without this lifecycle is insufficient evidence.

What Q-Sec provides
  • Risk-ranked findings mapped to ISO 27002 control domains
  • Evidence of management review sign-off built into report structure
  • Remediation tracking documentation for audit evidence package
  • Retest report confirming vulnerability closure — critical for surveillance
  • Optional attestation letter referencing ISO 27001 Annex A alignment
Auditor evidence checklist
  • Documented vulnerability management procedure (A.8.8)
  • Scope tied to asset register and risk assessment
  • Testing conducted by competent, independent resource
  • Findings risk-classified and linked to treatment plan
  • Management review of test results on record
  • Retest evidence or accepted risk documentation
  • Frequency appropriate to risk (annual minimum for most assets)
⚠️ Common audit gap: pentest conducted but findings not formally accepted or tracked through your risk treatment process — auditors treat this as an open nonconformity.
NIS2 Directive

Network & Information Security

Article 21 of NIS2 requires essential and important entities to implement "vulnerability handling and disclosure policies" and "security in network and information systems acquisition, development and maintenance" as proportionate risk management measures. Penetration testing is the primary technical mechanism to demonstrate compliance with both obligations.

National competent authorities assessing NIS2 compliance will expect evidence that testing is risk-based, covers business-critical systems, and that findings are actioned within a defined timeframe. Article 23 incident reporting obligations mean detection capability validation — often via pentest — is also scrutinised.

What Q-Sec provides
  • NIS2 Article 21 mapping in report and scope documentation
  • Coverage of network, cloud, and critical application assets
  • Detection capability validation option (SOC/SIEM alert testing)
  • Executive summary framed for board and senior management reporting obligations
  • Risk-proportionate scope recommendations based on your NIS2 entity classification
Auditor evidence checklist
  • Risk management measures documented (Art. 21)
  • Scope proportionate to entity classification (essential/important)
  • Network and information system coverage demonstrated
  • Vulnerability handling policy references testing cadence
  • Supply chain and third-party access included where relevant
  • Senior management sign-off on security measures
  • Testing frequency escalated for critical infrastructure operators
⚠️ Common audit gap: scope limited to perimeter only. NIS2 expects internal systems and continuity-critical processes to be covered — not just public-facing assets.
DORA

Digital Operational Resilience Act

DORA is the most prescriptive framework for penetration testing in EU financial services. Articles 24–27 create a two-tier requirement: all in-scope entities must conduct Basic DORA Penetration Testing (threat-based, scenario-driven), and significant entities must additionally undergo Threat-Led Penetration Testing (TLPT) — closely aligned to the TIBER-EU framework.

TLPT under DORA is particularly demanding: testing must be conducted against production systems (not test environments), threat intelligence must inform scenarios, and both the red team and intelligence providers must be independently certified. Supervisory authorities review TLPT results directly and may request remediation plans.

What Q-Sec provides
  • Basic DORA penetration testing aligned to Art. 24 requirements
  • Threat-intelligence-driven scenario design for TLPT-aligned engagements
  • Production environment testing protocols with rollback and safety procedures
  • Findings structured for competent authority reporting requirements
  • ICT risk management integration for Art. 6 compliance evidence
Auditor evidence checklist
  • Threat-based scenario design documented (Art. 25)
  • ICT systems in scope mapped to critical functions
  • Testing conducted by qualified independent testers
  • TLPT: red team and threat intel provider certifications on file
  • Production environment coverage with safety controls
  • Findings reported to management body (Art. 24.6)
  • TLPT minimum every 3 years; basic testing annually
⚠️ Common audit gap: using test environments instead of production for TLPT. DORA supervisors specifically require production testing to validate real resilience.
PCI DSS v4.0

Payment Card Industry Data Security

PCI DSS v4.0 Requirement 11.4 mandates external and internal penetration testing at least annually and after any significant infrastructure or application upgrade. Requirement 11.4.7 specifically requires testing of the network segmentation that defines your Cardholder Data Environment (CDE) scope — a failure here can expand your entire assessment scope and significantly increase compliance cost.

QSAs (Qualified Security Assessors) are rigorous on tester qualification: the individual must demonstrate knowledge of the PCI DSS, use industry-accepted methodology, and independence from the target environment. Engagement documentation must satisfy evidence requirements for the Report on Compliance (RoC).

What Q-Sec provides
  • External and internal pentest scoped to CDE and connected systems
  • Segmentation testing to validate CDE boundary integrity (Req. 11.4.5)
  • Tester qualification documentation suitable for QSA review
  • Report structure aligned to RoC evidence requirements
  • Retesting after remediation with updated status for each finding
Auditor evidence checklist
  • External pentest: annual + post-significant-change (11.4.3)
  • Internal pentest: annual + post-significant-change (11.4.4)
  • Segmentation test to verify CDE isolation (11.4.5)
  • Tester independence and qualification documented
  • Industry-accepted methodology stated (OWASP, PTES, NIST)
  • Exploitable vulnerabilities remediated and retested
  • Application-layer testing required — not network-only
⚠️ Common audit gap: segmentation testing omitted or conducted by the same team that manages the network. QSAs frequently raise this as a finding.
GDPR

General Data Protection Regulation

Article 32 of GDPR requires controllers and processors to implement "a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing." This is one of only four specific technical measures named — and it means regular penetration testing is effectively a GDPR obligation for any organisation processing personal data at meaningful scale.

Data Protection Authorities (DPAs) investigating post-breach notifications increasingly ask whether penetration testing was conducted and whether identified vulnerabilities were remediated. The absence of testing — or evidence that findings were not actioned — is a significant aggravating factor in fines under Articles 83(4) and 83(5).

What Q-Sec provides
  • Data exposure and access control testing across personal data processing systems
  • Article 32 compliance framing in scope documentation and report
  • DPIA integration support: testing evidence feeds directly into risk assessments
  • Findings documented as "regular testing" evidence for DPA review
  • Breach scenario modelling to demonstrate proportionate measures
Auditor evidence checklist
  • Regular testing process documented (Art. 32.1.d)
  • Scope includes systems processing special category data
  • Access control and data exposure testing covered
  • Findings fed into DPIA and risk register
  • Processor agreements reference testing obligations
  • Testing evidence retained and retrievable for DPA requests
  • Frequency must be "regular" — annual is baseline minimum
⚠️ Common audit gap: testing in place but DPIA not updated to reflect findings. DPAs expect a closed loop between technical testing and documented risk treatment.
SOC 2 Type II

Trust Service Criteria

Penetration testing is a key evidence point for multiple SOC 2 Trust Service Criteria. CC7.1 (detection and monitoring procedures) and CC4.1 (risk assessment process) both require evidence of technical security assessment activity. For SaaS and cloud service providers, auditors treat a current, well-scoped pentest as a near-mandatory control.

SOC 2 Type II audits cover a period (typically 12 months). If testing was conducted only once at the start of the period with no retesting, auditors may qualify their opinion on the continuity of control effectiveness. Continuous or semi-annual testing significantly strengthens your Type II report.

What Q-Sec provides
  • CC7.1, CC4.1, and CC6.x control mapping in findings documentation
  • Audit period coverage planning: timing advice for Type II windows
  • Evidence package formatted for CPA firm and auditor review
  • Continuous Security Validation subscription aligns with Type II audit period
  • Remediation evidence trail supporting "operating effectiveness" opinion
Auditor evidence checklist
  • CC7.1: Detection and monitoring — pentest as detective control
  • CC4.1: Risk assessment includes technical testing
  • CC6.1: Logical access controls validated by testing
  • Testing conducted within the audit period
  • Findings remediated or formally risk-accepted
  • Evidence retrievable and clearly dated
  • Type II: single test at period start may be insufficient
⚠️ Common audit gap: pentest report dated before the audit observation period. Timing matters — a test conducted two months before your period begins may not satisfy Type II operating effectiveness requirements.

How Q-Sec deliverables map to audit evidence requirements

Every document we produce is designed with your auditor in mind. This is what we hand you — and what it satisfies.

Q-Sec Deliverable ISO 27001 NIS2 DORA PCI DSS GDPR SOC 2
Scoping & Objectives Document A.8.8 Art. 21 Art. 25 11.4.1 Art. 32 CC4.1
Technical Findings Report (with PoC) A.8.8 Art. 21 Art. 24 11.4.3/4 Art. 32 CC7.1
Risk-Ranked Remediation Roadmap A.5.29 Art. 21 Art. 24.6 11.4.6 DPIA link CC4.1
Executive Summary & Management Briefing Mgmt review Board report Art. 24.6 Supporting Art. 32 CC1.x
Retest & Remediation Validation Report Closure loop Treatment Art. 24 11.4.6 Art. 32 Type II
Attestation Letter Certification Supporting Supporting RoC evidence Supporting Type II
Compliance Control Mapping Annex Annex A Art. 21 ICT risk Req. 11 Art. 32 TSC map
Primary Direct audit evidence
Supporting Corroborating evidence

Compliance pentesting nuances we design for

The details that separate a pentest that passes audit from one that creates more findings than it closes.

📅
Audit period timing

We advise on when to schedule testing relative to your audit window. A test three weeks before your SOC 2 observation period ends tells a very different story than one conducted six months prior.

🔗
Closed-loop evidence

Auditors don't just want a report — they want the loop closed. We structure remediation tracking and retest documentation to satisfy the full lifecycle that ISO 27001, PCI DSS, and SOC 2 auditors expect.

📐
Scope proportionality

NIS2 and DORA both require scope to be proportionate to entity classification and risk. We help you justify scope boundaries in writing — so "we only tested the website" doesn't become a finding.

🧾
Tester independence documentation

PCI DSS Req. 11.4.2 and ISO 27001 both require independence from the target. We provide tester qualification and independence declarations ready for QSA and certification body review.

⚠️
Risk acceptance — not just remediation

Not every finding gets fixed before audit. We document risk acceptance rationale in a format that satisfies auditor scrutiny — because "we knew about it and accepted the risk" is very different from "we didn't address it."

🏗️
Change-triggered retesting

PCI DSS and DORA both require retesting after significant infrastructure or application changes. We design continuous programmes with change-triggered testing triggers built in — not just calendar-based scheduling.

Report Structure

What the final report looks like

Q-Sec reports are designed to be read — not filed. Every deliverable has two audiences: your technical team who need to reproduce and fix findings, and your management who need to understand risk and make decisions. Both get exactly what they need.

📊
Executive Summary
Risk posture overview, business impact, top 3 priorities — designed to be shared with the board.
🔍
Technical Findings
Every finding with reproduction steps, PoC evidence, CVSS score, business context, and fix guidance.
🗺️
Remediation Roadmap
Prioritised by business impact and fix effort — not just CVSS. What to fix first and why.
📋
Compliance Mapping Annex
Findings mapped to relevant framework controls (ISO 27001, NIS2, DORA, PCI DSS, etc.).
Penetration Testing Report
CONFIDENTIAL
ClientACME Corp Ltd
ScopeWeb App + Internal Network
Testing typeGrey Box
FrameworksISO 27001 · NIS2 · DORA
Risk Summary
2
Critical
5
High
9
Medium
12
Low / Info
Top Findings (Sample)
Critical
PT-001
Unauthenticated Remote Code Execution — Admin API
CVSS 9.8 Web Application ISO A.8.8
Missing authentication on admin endpoint allows arbitrary command execution. Immediate remediation required.
High
PT-004
Kerberoastable Service Account — Domain Admin Path
CVSS 8.1 Active Directory MITRE T1558.003
Service account with weak password hash crackable offline, providing lateral movement path to Domain Admin.
High
PT-006
Azure Storage Account Publicly Accessible
CVSS 7.5 Cloud (Azure) GDPR Art. 32
Blob container with customer PII data exposed publicly without authentication. Data exposure confirmed.
Medium
PT-009
Missing HTTP Security Headers (CSP, HSTS, X-Frame-Options)
CVSS 5.3 Web Application OWASP Top 10 A05
Security headers absent across all production web properties, increasing XSS and clickjacking exposure.

Illustrative example — format and findings vary by engagement scope

Start with a conversation

Ready to see your real risk — before an attacker does?

A scoping call with Q-Sec takes 30 minutes. We'll clarify your objectives, recommend the right approach, and give you a clear picture of what an engagement would cover — with no obligation and no jargon.