Attestation: The opinion of truth/conclusion that is associated with an audit.
Audit committee: A group that is responsible for all of the risk management associated with an organization, and both starting/stopping any internal audits.
Self-assessments: Allows an organization to look at its internal processes and procedures and see how well they match the requirements for the organization.
Physical penetration test: Pentest that involves attackers attempting to gain access to the physical facility/devices.
Offensive penetration test: A test designed to evaluate the effectiveness of security controls in preventing unauthorized access and manipulation of systems, often simulating real-world attacks to identify vulnerabilities.
Defensive penetration test: Refers to the defensive/blue team that identifies attacks coming in real time and blocks the attacks from occurring.
Integrated penetration test: A holistic approach that combines different types of penetration testing methodologies and techniques to evaluate an organization's security operations. Often combines defensive and offensive pentesting.
Known environment pentesting: A penetration test where the tester has detailed knowledge about the target system or network, including information about the network architecture, hardware, and software configurations, system vulnerabilities, and users.
Partially known environment pentesting: A penetration test where the attacker possesses limited knowledge about the target system or network, and may employ reconnaissance techniques to gather additional information.
Unknown environment pentesting: A penetration test where the tester has little prior knowledge about the target system or network. Aims to mimic an attack from an unknown entity and discover potential vulnerabilities.
Passive reconnaissance: Penetration testing/information gathering techniques that do not interact with target systems directly (e.g., OSINT, network traffic monitoring/taps).
Active reconnaissance: Penetration testing/information gathering techniques that interact with target systems directly (e.g., port scanning, DNS enumeration).