Penetration Testing

  • Home
  • Penetration Testing
Penetration Testing

For Web Apps, Networks, PCI, Internal, & External

What is a Penetration Test?

Penetration testing helps to uncover architectural and conceptual issues through emulated, real-world attacks. The best way to know if your organization is susceptible to a security breach is to test your defenses. By evaluating the strength of your company’s infrastructure and revealing vulnerabilities, you can effectively manage those weaknesses.

Types Penetration Tests offered by CIMS?

  • Web Apps Pen Tests
  • Internal & External Pen Tests
  • Networks & Compliance Pen Tests

How Does CIMS Approach Penetration Testing Engagements?


CIMS evaluates various points of exposure in your programs, systems, and networks, attempting to gain deeper levels of access and higher levels of security clearance. Once these access points are identified, we’ll work with you to build a plan that helps your company be better prepared to face threats.

Our penetration test services have been accepted to satisfy the requirements of HITRUST, ISO 27000-1, NIST CSF, FFIEC, NCUA, GLBA, FISMA, SOC2.

External Penetration Test
Consists of enumerating and verifying vulnerabilities that could be exploited by external attackers to gain unauthorized access to your systems. CIMS’s team plays the role of an external attacker, attempting to exploit vulnerable systems to obtain confidential information or compromise network perimeter defenses.

Internal Penetration Test
Focuses on determining the potential business impact of a security breach and validating the level of effort required for an attacker to overcome your security infrastructure. After access is gained, FRSecure identifies configuration issues and vulnerabilities that can be exploited. Using that information, FRSecure attempts to complete several objectives that are designed to replicate common attacker behaviors.

Red Teaming
A more holistic standard of penetration testing. Red teams simulate real-world attacks that focus on the effectiveness of an entire information security program utilizing the same tools, tactics and techniques that adversaries would likely employ. The goal is different in that adds focus to people and process, not just a particular sub-system within your tech stack.

Web App Penetration Test
Focuses on evaluating the security of a web application by using aspects of the Penetration Testing Execution Standard (PTES) and the OWASP standard testing checklist, and involves an active analysis of the application for any weaknesses, technical flaws or other vulnerabilities. You’ll receive an assessment of the potential impact, steps to reproduce the issue if applicable, and CIMS’s recommendations for remediation.

Physical Penetration Test
Measures the effectiveness of security training, internal procedures, and technical controls by attempting physical access to your organization. FRSecure staff will pose as a legitimate person or company (fire inspector, exterminator, power company technician, etc.) and then attempt to gain access to restricted areas, obtain a physical network connection, or access unattended workstations or information stores.

PCI-DSS Penetration Test
With specific goals set by the PCI Security Standards Council, this test involves both external and internal penetration test methodologies. The two main objectives of this test are; 1) To determine whether and how a malicious user can gain access to assets that affect the fundamental security of the systems, files, logs and cardholder data; 2) To confirm that the applicable controls required by PCI DSS are in place.

Related Posts

Vendor Risk Management

More than half of all security breaches result from third-party vendors hired by your organization.

Read More

Vulnerability Assessment

One of the most critical areas of risk is technical vulnerabilities. Unpatched operating systems, third-party

Read More

Threat Hunter

CIMS Threat hunters identify advanced threats, and then track and mitigate them before clients organizational

Read More