search menu icon-carat-right cmu-wordmark

Plan, Do, Check, Act

White Paper
In this paper, Ken van Wyk provides a primer on the most commonly used tools for traditional penetration testing.

Software Engineering Institute


This article describes a tried and true approach to security improvement that can be effectively used during deployment and operations. It identifies prerequisites that must be in place to sustain a desired state of security. It provides a set of minimum requirements for security hygiene and several security implementation frameworks that can be used in concert with the other articles in this content area.