Plan, Do, Check, Act
• White Paper
In this paper, Ken van Wyk provides a primer on the most commonly used tools for traditional penetration testing.
Publisher
Software Engineering Institute
Topic or Tag
Abstract
This article describes a tried and true approach to security improvement that can be effectively used during deployment and operations. It identifies prerequisites that must be in place to sustain a desired state of security. It provides a set of minimum requirements for security hygiene and several security implementation frameworks that can be used in concert with the other articles in this content area.