TVM-06: Are processes, procedures, and technical measures defined, implemented, and
evaluated for periodic, independent, third-party penetration testing?
A formal schedule of red team exercises interspersed with risk assessments, remediation, and penetration testing aligned to the applicable service model (I-P-SaaS, and XaaS) should be established. Penetration testing should comply with all applicable laws and regulations. A written and signed authorization should be obtained and verified before and after services are rendered. Penetration test schedules should be published on the integrated TVM system to ensure tactics, techniques, and test procedures adhere to documented policies.
Control implemented
Control ownership
Description
Define, implement and evaluate processes, procedures and technical
measures for the periodic performance of penetration testing by independent
third parties.