Security Testing



Definition

Security Testing
(a.k.a., Penetration Testing)
the testing of a system, application, or component against its security requirements and the implementation of its security mechanisms

Goals

The typical goals of security testing are to:

Objectives

The typical objectives of security testing are to:

Examples

Typical examples include:

Preconditions

Security test execution can typically begin when the following preconditions hold:

Completion Criteria

Security testing is typically complete when the following postconditions hold:

Tasks

Security testing involves the security team performing the following testing tasks:

Environments

Security testing is performed on the following environments using the following tools:

Work Products

Security testing typically results in the production of all or part of the following work products from the test work product set:

Phases

Security testing typically consists of the following tasks being performed during the following phases:

PHASE →
TASK ↓
Business
Strategy

(1)
Business
Optimization
Initiation
(2)
(3)
Construction
(4)
Delivery
(5)
Usage Retirement
Test
Planning
Not
Applicable
Not
Applicable
Completed Optional
Regression
Not
Applicable
Not
Applicable
Not
Applicable
Test
Reuse
Not
Applicable
Not
Applicable
Optionally
Started (6)
Completed Not
Applicable
Not
Applicable
Not
Applicable
Test
Design
Not
Applicable
Not
Applicable
Optionally
Started (6)
Completed Not
Applicable
Ongoing Not
Applicable
Test
Implementation
Not
Applicable
Not
Applicable
Optionally
Started (6)
Completed Not
Applicable
Ongoing Not
Applicable
Test
Execution
Not
Applicable
Not
Applicable
Optionally
Started (6)
Completed Not
Applicable
Ongoing Not
Applicable
Test
Reporting
Not
Applicable
Not
Applicable
Not
Applicable
Completed Not
Applicable
Ongoing Not
Applicable

(1) Optional security testing of COTS software components during the technology analysis and technology vendor selection tasks.
(2) The first round of security testing occurs after the hardware components have been networked, and the hardware architecture has been reviewed for security considerations.
(3) The second round of security testing occurs after both the software components and the content has been distributed on the hardware components.
(4) The third round of security testing is part of the acceptance testing prior to launch.
(5) Security testing should be performed on a periodic basis thereafter.
(6) Optional security testing of the executable architecture as well as the COTS components during the vendor and tool evaluation and vendor and tool selection tasks.

Guidelines