This document is a sample of a vulnerability testing process for a fictitious company, Company X. It outlines Company X
The methodology must incorporate the following:
  • Adaptable: The Vulnerability Test Process is adaptable to various types of security testing, including password cracking, network discovery and penetration testing.
  • Auditable: The Vulnerability Test Process is documented and has defined objectives.
  • Repeatable: The Vulnerability Test Process is repeatable

The link for this article located at Infosec Writers is no longer available.