Compliance Security

Vulnerability and penetration testing for verifiable security

Many organisations do not have a complete overview of which of their systems are externally accessible, and even fewer know which known vulnerabilities in these systems have already been documented but not yet remediated. These gaps are precisely what attackers exploit in a targeted manner. Attacks on critical infrastructures affect organisations of all sizes, across all industries, and often without warning.

The current situation report from the German Federal Office for Information Security (BSI) highlights that the security situation in Germany remains at a tense level.1 On average, 119 new vulnerabilities are recorded worldwide every day, while attack surfaces remain insufficiently protected.2

This leads to a concrete problem. In addition to defending against attacks, gaining transparency over one’s own attack surface is becoming increasingly important. Only when it is clear where vulnerable systems actually exist and how critical they are can risks be meaningfully prioritised and mitigation measures effectively managed. Vulnerability assessments and penetration tests provide this clarity. They systematically examine attack surfaces before a real attacker can exploit them.

What is a vulnerability assessment?

A vulnerability assessment (VA) systematically identifies known vulnerabilities in systems, networks, applications or cloud environments and evaluates them based on their criticality. This results in a reliable overview of all attack vectors, forming the basis for vulnerability management and all subsequent security measures.

The main advantage lies in prioritisation. Security and IT teams gain visibility not only into existing vulnerabilities but also into where to act first. This is particularly valuable when resources are limited and not all findings can be addressed simultaneously.

Core components of a professional vulnerability assessment:

  • Automated scanning of IT infrastructure using specialised tools (e.g. Nessus, Qualys, OpenVAS)
  • CVE correlation and CVSS-based risk assessment of all findings (Critical, High, Medium, Low)
  • Identification of misconfigurations in operating systems, services, network components and cloud environments
  • Patch level analysis to detect outdated software versions and missing security updates
  • Network segmentation testing to identify unintended communication paths between network zones
  • Prioritised reporting with concrete remediation recommendations

When is a vulnerability assessment appropriate?

Vulnerability assessments must be performed regularly as part of continuous vulnerability management. They should also be conducted after significant system changes, such as the introduction of new systems, applications or cloud services, major infrastructure changes or migrations. Other triggers include mergers and acquisitions (IT due diligence) or as a baseline assessment before a penetration test. A re-analysis of vulnerabilities may also be required in the context of compliance requirements (e.g. DORA, NIS2, ISO 27001, BSI IT-Grundschutz).

What a vulnerability assessment does and does not do

Vulnerability tests reveal existing vulnerabilities, but do not show how these can be combined and exploited in a real-world attack.

They provide a fact-based prioritisation, but are no substitute for a manual security assessment carried out by experienced experts. To validate actual exploitability, a penetration test is the appropriate approach.

What is a penetration test?

A penetration test (pentest) verifies whether identified vulnerabilities can actually be exploited and what the resulting impact would be. Qualified IT security experts, often referred to as ethical hackers or red team specialists, simulate targeted attacks on systems, applications or processes. The focus is not only on identifying vulnerabilities but on proving their exploitability and assessing the associated damage potential.

A penetration test shows how far an attacker could get: which vulnerabilities can be combined, how deeply they can penetrate the network, and which data or systems could actually be compromised.

This is the key difference compared to a vulnerability assessment: instead of merely identifying weaknesses, the goal is to understand what an attacker could realistically do with them.

Penetration testing approaches

ModelDescriptionTypical use case
Black BoxNo prior knowledge of target systems; attacker acts as an external entitySimulation of external attackers, realistic scenarios
Grey BoxPartial knowledge (e.g. credentials, network diagrams)Insider scenarios, cloud environments, partner access
White BoxFull documentation and source code availableDeep analysis, secure development, code reviews

Typical scope areas in penetration testing

A penetration test can address various attack vectors. Here are the most common areas of focus:

  • External network infrastructure: firewalls, VPNs, exposed services, DMZ components
  • Internal networks: lateral movement, privilege escalation, Active Directory attacks
  • Web applications and APIs: OWASP Top 10, authentication flaws, injection attacks, business logic flaws
  • Mobile applications: iOS and Android apps, local data storage, communication security
  • Cloud infrastructure: AWS/Azure/GCP configurations, IAM vulnerabilities, storage permissions
  • Social engineering: phishing simulations, vishing, physical tests (red teaming)

Process of a professional penetration test

A pentest follows a defined methodology based on recognised standards (PTES, OWASP, BSI guidelines):

Process diagram of a six-step penetration test
  • Scoping and commissioning
    Definition of scope, objectives and framework conditions. A formal legal engagement is mandatory.
  • Reconnaissance
    Information gathering (active and passive) and identification of attack surfaces.
  • Vulnerability analysis
    Combined manual and automated analysis of vulnerabilities.
  • Exploitation
    Controlled attempts to exploit vulnerabilities and gain initial access.
  • Post-exploitation
    Analysis of lateral movement, privilege escalation and potential data exfiltration.
  • Reporting and retesting
    Detailed report including executive summary, CVSS-rated findings, remediation recommendations and optional retesting.

Vulnerability assessment vs penetration test

Both methods pursue different objectives. The following overview summarises the key differences.

CriterionVulnerability assessmentPenetration test
ObjectiveIdentify and prioritise vulnerabilitiesProve exploitability and impact
MethodologyAutomated scanning and manual analysisManual simulation of real attacks
DepthBroad coverageDeep attack scenarios
FrequencyRegularEvent-driven (annually or after changes)
EffortLow to mediumMedium to high
OutputPrioritised list of vulnerabilitiesVerified attack paths and scenarios
ComplianceBasis for vulnerability managementEvidence for NIS2, ISO 27001, PCI DSS, DORA

Synergistic interaction

A proactive security programme integrates both approaches into a continuous process. Organisations relying solely on regular scans may know their vulnerabilities but not which ones are truly critical in an attack scenario.

Those relying only on penetration tests risk missing newly emerging vulnerabilities between tests.

The recommended approach is continuous vulnerability assessment combined with event-driven penetration testing after major changes, annually, or in line with compliance requirements. Results from both methods should feed into a unified remediation prioritisation process, followed by retesting to validate fixes.

Practical recommendation

Start with a comprehensive vulnerability assessment to establish an up-to-date baseline for your security status. Use the results to prioritise your actions and commission a penetration test that focuses specifically on critical areas and attack vectors. This will maximise the insights you gain whilst optimising the use of resources.

Our services in the field of vulnerability assessment and penetration testing

Regulatory requirements

Frameworks such as NIS2, ISO 27001, DORA, PCI DSS and BSI IT-Grundschutz require organisations to demonstrate that technical security measures are implemented and regularly tested for effectiveness. Failure to provide such evidence can result in fines and loss of trust from customers and regulators.

Both methods deliver documented, reproducible results that can be directly incorporated into compliance reports and audit documentation.

Quality criteria for selecting a provider

The quality of vulnerability assessments (VA) and penetration tests depends largely on the service provider’s expertise. The following criteria are key when making a selection.

  • Proven certifications: OSCP, CEH, GPEN, CREST or comparable
  • Methodological transparency: use of recognised standards (PTES, OWASP, BSI)
  • Clear contractual framework: scope, liability, confidentiality and data handling
  • Target audience-oriented reporting: executive summaries for management and technical depth for operations
  • Remediation support and retesting
  • Industry expertise in regulated sectors

Proactive security requires both approaches

Vulnerability assessments and penetration tests are not competing approaches. Rather, they are complementary pillars of an effective IT security strategy. Vulnerability assessments provide visibility and enable continuous, fact-based vulnerability management. Penetration tests demonstrate the potential actions of attackers.

Combining the two into an ongoing process establishes a robust basis for risk management, credible communication at board level and demonstrable compliance with growing regulatory requirements.

Contact

Are you looking for an experienced and reliable IT partner?

We offer customised solutions to meet your needs – from consulting, development and integration to operation.

Contact us now

Sources

  1. BSI (2025): Die Lage der IT-Sicherheit in Deutschland 2025 (Zusammenfassung)
    BSI – Bundesamt für Sicherheit in der Informationstechnik – Die Lage der IT-Sicherheit in Deutschland 2025 (Zusammenfassung)
    Retrieved on 08/04/2026
  2. BSI (2025): Die Lage der IT-Sicherheit in Deutschland 2025
    Die Lage der IT-Sicherheit in Deutschland 2025
    Retrieved on 08/04/2026