Security Assessment and Testing

Evaluating, validating, and continuously improving security controls through structured testing and monitoring.

Introduction

This domain focuses on how organizations verify that security controls are properly implemented and effective. It includes testing, auditing, vulnerability management, and continuous monitoring.

For ICT professionals, assessment and testing are critical because security controls that are not tested may fail silently, leaving systems exposed to real-world attacks.

Outcome 1

Understand different testing methods and when to apply them.

Outcome 2

Evaluate effectiveness of security controls and identify weaknesses.

Outcome 3

Interpret results and improve security posture continuously.

Figures

Assessment lifecycle

Plan
Scan
Test
Report
Improve

Testing types

SAST
DAST
Pentest
Audit
Monitoring

Case Examples

Missed vulnerability

A critical vulnerability remains undetected due to lack of scanning.

  • Implement regular vulnerability scans
  • Apply patch management

Weak testing coverage

Security controls exist but are never validated in real scenarios.

  • Perform penetration testing
  • Conduct audits and reviews

Glossary (50 Terms)

#TermDefinition
1Security AssessmentA structured evaluation of security controls to determine whether they are properly implemented and effective in protecting systems and data.
2Vulnerability AssessmentThe process of identifying, classifying, and prioritizing vulnerabilities in systems, applications, and networks.
3Penetration TestingA simulated attack on a system to identify exploitable vulnerabilities and assess real-world security defenses.
4AuditA formal review of systems and processes to ensure compliance with policies, standards, and regulations.
5MonitoringContinuous observation of systems and networks to detect anomalies, threats, or policy violations.
6SASTStatic Application Security Testing analyzes source code without executing it to identify vulnerabilities early in development.
7DASTDynamic Application Security Testing evaluates running applications to identify vulnerabilities during execution.
8Security TestingThe process of evaluating systems to identify vulnerabilities, misconfigurations, and weaknesses that could be exploited.
9Test PlanA documented approach outlining scope, objectives, and methods used during security testing activities.
10Test CoverageThe extent to which testing activities evaluate different components, functions, and scenarios within a system.
11Threat ModelingThe process of identifying potential threats and vulnerabilities during system design and development.
12Code ReviewManual or automated examination of source code to identify security flaws and ensure compliance with coding standards.
13Configuration ReviewEvaluation of system configurations to ensure secure settings and compliance with security policies.
14Log AnalysisThe process of reviewing system and application logs to detect suspicious activities and security incidents.
15Continuous MonitoringOngoing assessment of systems and controls to detect changes, vulnerabilities, or threats in real time.
16Risk AssessmentThe process of identifying and evaluating risks to determine their potential impact and likelihood.
17Security MetricsQuantitative measures used to evaluate the effectiveness of security controls and overall security posture.
18Compliance TestingVerifying that systems and processes meet regulatory, legal, and policy requirements.
19BaselineA standard configuration or performance level used as a reference point for security assessments.
20ScanningAutomated process of identifying vulnerabilities or misconfigurations within systems or networks.
21False PositiveA test result indicating a vulnerability that does not actually exist, requiring validation.
22False NegativeA failure to detect an existing vulnerability, potentially leaving systems exposed.
23ExploitA method or tool used to take advantage of a vulnerability in a system.
24Security Control TestingEvaluating whether implemented controls function correctly and effectively mitigate risks.
25Red TeamA group that simulates adversary attacks to test organizational security defenses.
26Blue TeamA group responsible for defending systems against attacks and responding to incidents.
27Purple TeamA collaborative approach combining red and blue team efforts to improve security testing and defense.
28Security Testing ToolsSoftware used to automate vulnerability scanning, testing, and analysis activities.
29Security Assessment ReportA document summarizing findings, vulnerabilities, and recommendations identified during testing.
30RemediationThe process of fixing identified vulnerabilities and improving security controls.
31Patch ManagementThe process of updating systems to fix vulnerabilities and improve security.
32Penetration ScopeThe defined boundaries and targets included in a penetration test engagement.
33Test EnvironmentA controlled setting where security tests are performed without impacting production systems.
34Live TestingSecurity testing conducted on operational systems, requiring careful planning to avoid disruption.
35Internal TestingTesting performed from within the organization’s network to simulate insider threats.
36External TestingTesting conducted from outside the network to simulate external attacker behavior.
37Black Box TestingTesting without prior knowledge of the system, simulating an external attacker’s perspective.
38White Box TestingTesting with full knowledge of the system, including source code and architecture.
39Gray Box TestingTesting with partial knowledge of the system to balance realism and efficiency.
40Security BenchmarkA standard guideline used to evaluate system configurations and security practices.
41Security PostureThe overall strength of an organization’s security controls and readiness against threats.
42Control ValidationConfirming that security controls are correctly implemented and operating as intended.
43Evidence CollectionGathering data during testing to support findings and conclusions.
44Forensic ReadinessPreparation to collect and preserve evidence for investigations.
45Security Testing FrameworkA structured approach guiding testing processes and methodologies.
46AutomationUsing tools to perform repetitive testing tasks efficiently and consistently.
47Manual TestingHuman-driven testing that identifies complex vulnerabilities tools may miss.
48Risk-Based TestingPrioritizing testing efforts based on risk levels and potential impact.
49Continuous ImprovementOngoing enhancement of security controls based on testing results and evolving threats.
50Security ValidationThe process of ensuring systems meet security requirements and perform as expected under testing conditions.